Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 06:32
Static task
static1
Behavioral task
behavioral1
Sample
2bcd09cc1b6e3c2c89d974778fc5b97e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2bcd09cc1b6e3c2c89d974778fc5b97e.exe
Resource
win10v2004-20231215-en
General
-
Target
2bcd09cc1b6e3c2c89d974778fc5b97e.exe
-
Size
48KB
-
MD5
2bcd09cc1b6e3c2c89d974778fc5b97e
-
SHA1
9c2ab5ee8496eab8e9d2b3224cd58077315096ac
-
SHA256
dce9f4393ef3f7587f5ef5975da28f48beacbd86762bc8edd8a5a63bccd4cbd7
-
SHA512
62832266f58b2037da9d7e40f63c62e370f5cfa478f8e5cfc00ec0af811ddda02ee051235dcfa243c0a5701a9add7874ed37841551b4460a431409eca416af9c
-
SSDEEP
768:/d6E+WFOTkRDyWKpoDG4hu1crBXBovves9:/djvSxUAvf
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4540 delnicek.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\delnice.dll 2bcd09cc1b6e3c2c89d974778fc5b97e.exe File created C:\Windows\SysWOW64\delnicek.exe 2bcd09cc1b6e3c2c89d974778fc5b97e.exe File opened for modification C:\Windows\SysWOW64\delnicek.exe 2bcd09cc1b6e3c2c89d974778fc5b97e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1964 wrote to memory of 4540 1964 2bcd09cc1b6e3c2c89d974778fc5b97e.exe 89 PID 1964 wrote to memory of 4540 1964 2bcd09cc1b6e3c2c89d974778fc5b97e.exe 89 PID 1964 wrote to memory of 4540 1964 2bcd09cc1b6e3c2c89d974778fc5b97e.exe 89 PID 1964 wrote to memory of 2688 1964 2bcd09cc1b6e3c2c89d974778fc5b97e.exe 92 PID 1964 wrote to memory of 2688 1964 2bcd09cc1b6e3c2c89d974778fc5b97e.exe 92 PID 1964 wrote to memory of 2688 1964 2bcd09cc1b6e3c2c89d974778fc5b97e.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bcd09cc1b6e3c2c89d974778fc5b97e.exe"C:\Users\Admin\AppData\Local\Temp\2bcd09cc1b6e3c2c89d974778fc5b97e.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\delnicek.exeC:\Windows\system32\delnicek.exe ˜‰2⤵
- Executes dropped EXE
PID:4540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2bcd09cc1b6e3c2c89d974778fc5b97e.exe.bat2⤵PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD53b9ff623bead9d49d3e830d8d97b7805
SHA18886b30e40e0c5fb56d98b019c8c747061bb4e86
SHA256c846890765f36d4089c36227e63ce1c510a5ff752b06bdb07014d7c6882f55ab
SHA512aa16b096efc2531c80e7052867353714b1bfdfc2aa36bc2a304e5e870b65acc84e2637500d1609d69860d30e18667a07a19541748e506d5a1137482dcaf2d980
-
Filesize
48KB
MD52bcd09cc1b6e3c2c89d974778fc5b97e
SHA19c2ab5ee8496eab8e9d2b3224cd58077315096ac
SHA256dce9f4393ef3f7587f5ef5975da28f48beacbd86762bc8edd8a5a63bccd4cbd7
SHA51262832266f58b2037da9d7e40f63c62e370f5cfa478f8e5cfc00ec0af811ddda02ee051235dcfa243c0a5701a9add7874ed37841551b4460a431409eca416af9c