Analysis
-
max time kernel
12s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 07:10
Behavioral task
behavioral1
Sample
2cd6efb80213b0b5a2a308448a859f9b.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
2cd6efb80213b0b5a2a308448a859f9b.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
2cd6efb80213b0b5a2a308448a859f9b.exe
-
Size
12KB
-
MD5
2cd6efb80213b0b5a2a308448a859f9b
-
SHA1
edb6f03ce19f9b83ee1359a2854f0fcf5a00580d
-
SHA256
9cd370d3c02ab492bb1852f32dc1512a29e88c83bee2f75c105f03a835a0f354
-
SHA512
c318153a8d7a4de0cf2194a1b6548d761d649e24ce774a09de6f9bef287e582ce246e4f91ab34e1e4ec84319738661a32d290d959203e92c38e58033dd1e2243
-
SSDEEP
384:MyKlbccVW/QBxP4VF9d+IwB6F0pBxak4MkE2tKOBg:5UhVWoBiT9C6apBxaNtK
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 944 instokk.exe -
Loads dropped DLL 2 IoCs
pid Process 3028 2cd6efb80213b0b5a2a308448a859f9b.exe 3028 2cd6efb80213b0b5a2a308448a859f9b.exe -
resource yara_rule behavioral1/memory/3028-1-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/944-12-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/3028-4-0x0000000000230000-0x000000000023E000-memory.dmp upx behavioral1/memory/3028-13-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\instok.dll 2cd6efb80213b0b5a2a308448a859f9b.exe File created C:\Windows\SysWOW64\instokk.exe 2cd6efb80213b0b5a2a308448a859f9b.exe File opened for modification C:\Windows\SysWOW64\instokk.exe 2cd6efb80213b0b5a2a308448a859f9b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 944 3028 2cd6efb80213b0b5a2a308448a859f9b.exe 17 PID 3028 wrote to memory of 944 3028 2cd6efb80213b0b5a2a308448a859f9b.exe 17 PID 3028 wrote to memory of 944 3028 2cd6efb80213b0b5a2a308448a859f9b.exe 17 PID 3028 wrote to memory of 944 3028 2cd6efb80213b0b5a2a308448a859f9b.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cd6efb80213b0b5a2a308448a859f9b.exe"C:\Users\Admin\AppData\Local\Temp\2cd6efb80213b0b5a2a308448a859f9b.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\instokk.exeC:\Windows\system32\instokk.exe ˜‰2⤵
- Executes dropped EXE
PID:944
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\2cd6efb80213b0b5a2a308448a859f9b.exe.bat2⤵PID:2664
-