Analysis
-
max time kernel
76s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 07:10
Behavioral task
behavioral1
Sample
2cd6efb80213b0b5a2a308448a859f9b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2cd6efb80213b0b5a2a308448a859f9b.exe
Resource
win10v2004-20231215-en
General
-
Target
2cd6efb80213b0b5a2a308448a859f9b.exe
-
Size
12KB
-
MD5
2cd6efb80213b0b5a2a308448a859f9b
-
SHA1
edb6f03ce19f9b83ee1359a2854f0fcf5a00580d
-
SHA256
9cd370d3c02ab492bb1852f32dc1512a29e88c83bee2f75c105f03a835a0f354
-
SHA512
c318153a8d7a4de0cf2194a1b6548d761d649e24ce774a09de6f9bef287e582ce246e4f91ab34e1e4ec84319738661a32d290d959203e92c38e58033dd1e2243
-
SSDEEP
384:MyKlbccVW/QBxP4VF9d+IwB6F0pBxak4MkE2tKOBg:5UhVWoBiT9C6apBxaNtK
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 232 instokk.exe -
resource yara_rule behavioral2/memory/628-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x0007000000023201-4.dat upx behavioral2/memory/232-7-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/628-6-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\instok.dll 2cd6efb80213b0b5a2a308448a859f9b.exe File created C:\Windows\SysWOW64\instokk.exe 2cd6efb80213b0b5a2a308448a859f9b.exe File opened for modification C:\Windows\SysWOW64\instokk.exe 2cd6efb80213b0b5a2a308448a859f9b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 628 wrote to memory of 232 628 2cd6efb80213b0b5a2a308448a859f9b.exe 20 PID 628 wrote to memory of 232 628 2cd6efb80213b0b5a2a308448a859f9b.exe 20 PID 628 wrote to memory of 232 628 2cd6efb80213b0b5a2a308448a859f9b.exe 20 PID 628 wrote to memory of 5112 628 2cd6efb80213b0b5a2a308448a859f9b.exe 103 PID 628 wrote to memory of 5112 628 2cd6efb80213b0b5a2a308448a859f9b.exe 103 PID 628 wrote to memory of 5112 628 2cd6efb80213b0b5a2a308448a859f9b.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cd6efb80213b0b5a2a308448a859f9b.exe"C:\Users\Admin\AppData\Local\Temp\2cd6efb80213b0b5a2a308448a859f9b.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\instokk.exeC:\Windows\system32\instokk.exe ˜‰2⤵
- Executes dropped EXE
PID:232
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2cd6efb80213b0b5a2a308448a859f9b.exe.bat2⤵PID:5112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD52cd6efb80213b0b5a2a308448a859f9b
SHA1edb6f03ce19f9b83ee1359a2854f0fcf5a00580d
SHA2569cd370d3c02ab492bb1852f32dc1512a29e88c83bee2f75c105f03a835a0f354
SHA512c318153a8d7a4de0cf2194a1b6548d761d649e24ce774a09de6f9bef287e582ce246e4f91ab34e1e4ec84319738661a32d290d959203e92c38e58033dd1e2243