Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 07:28
Behavioral task
behavioral1
Sample
2d65ea715f66790da8fda014c4477971.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
2d65ea715f66790da8fda014c4477971.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
2d65ea715f66790da8fda014c4477971.exe
-
Size
12KB
-
MD5
2d65ea715f66790da8fda014c4477971
-
SHA1
823d1e5e23ff249e0976217cbb142659b5074bc9
-
SHA256
83c926c93e0f6d4f0a6d2a9a862be959dd2fe0f324ec49adce52bd910bf24237
-
SHA512
2eb885e66afe5cf65140acb0f085464f35b690b35bea9a68d2bc069ce36007042fb4ab252ad18e71b7376c9465115da67306a8832e8639b516dab4987ddd5581
-
SSDEEP
192:vSae1PMLcWP8dmslv6MEcU1i3XDnDYxt8Y80f1oq49EyNcIzz:vSaexdLk1tcjDcB8Ei9zd
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1928 xsiscok.exe -
resource yara_rule behavioral2/memory/2900-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/1928-7-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2900-6-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\xsisco.dll 2d65ea715f66790da8fda014c4477971.exe File created C:\Windows\SysWOW64\xsiscok.exe 2d65ea715f66790da8fda014c4477971.exe File opened for modification C:\Windows\SysWOW64\xsiscok.exe 2d65ea715f66790da8fda014c4477971.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2900 wrote to memory of 1928 2900 2d65ea715f66790da8fda014c4477971.exe 20 PID 2900 wrote to memory of 1928 2900 2d65ea715f66790da8fda014c4477971.exe 20 PID 2900 wrote to memory of 1928 2900 2d65ea715f66790da8fda014c4477971.exe 20 PID 2900 wrote to memory of 2328 2900 2d65ea715f66790da8fda014c4477971.exe 103 PID 2900 wrote to memory of 2328 2900 2d65ea715f66790da8fda014c4477971.exe 103 PID 2900 wrote to memory of 2328 2900 2d65ea715f66790da8fda014c4477971.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d65ea715f66790da8fda014c4477971.exe"C:\Users\Admin\AppData\Local\Temp\2d65ea715f66790da8fda014c4477971.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\xsiscok.exeC:\Windows\system32\xsiscok.exe ˜‰2⤵
- Executes dropped EXE
PID:1928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2d65ea715f66790da8fda014c4477971.exe.bat2⤵PID:2328
-