Analysis
-
max time kernel
4s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 16:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3d6258aff21a972ac848fcbc0da64cf3.exe
Resource
win7-20231129-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
3d6258aff21a972ac848fcbc0da64cf3.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
3d6258aff21a972ac848fcbc0da64cf3.exe
-
Size
96KB
-
MD5
3d6258aff21a972ac848fcbc0da64cf3
-
SHA1
10071a7805bbef129c549201a75cb812263536a6
-
SHA256
e46e71e8c6cda6f143dfcc6a319badd0add38b3e25a4d6fddae59b17bd512ee4
-
SHA512
71be70c461d02cd4b171b7f0c25220fe8f1eed3af27e9e0b14703ad158bf9771769639d1296c3ba2e472bc402373a05a11e6a37ebdca6e067cdcccaf6bd730ca
-
SSDEEP
1536:BVsieIi8aA0a2uIU+OBTiaTJn8etNNOhj/85Wa1sqARs9LJK0R+:BRez8JPIU5Tlnrtv47qMoo0R+
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 400 51082.exe 4624 51082.exe 4916 61CA1.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\51082.exe 3d6258aff21a972ac848fcbc0da64cf3.exe File opened for modification C:\Windows\SysWOW64\MSWINSCK.OCX 51082.exe File opened for modification C:\Windows\SysWOW64\61CA1.exe 51082.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 456 3d6258aff21a972ac848fcbc0da64cf3.exe 400 51082.exe 4624 51082.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 456 wrote to memory of 400 456 3d6258aff21a972ac848fcbc0da64cf3.exe 36 PID 456 wrote to memory of 400 456 3d6258aff21a972ac848fcbc0da64cf3.exe 36 PID 456 wrote to memory of 400 456 3d6258aff21a972ac848fcbc0da64cf3.exe 36 PID 400 wrote to memory of 3860 400 51082.exe 35 PID 400 wrote to memory of 3860 400 51082.exe 35 PID 400 wrote to memory of 3860 400 51082.exe 35 PID 400 wrote to memory of 1080 400 51082.exe 33 PID 400 wrote to memory of 1080 400 51082.exe 33 PID 400 wrote to memory of 1080 400 51082.exe 33 PID 456 wrote to memory of 2824 456 3d6258aff21a972ac848fcbc0da64cf3.exe 32 PID 456 wrote to memory of 2824 456 3d6258aff21a972ac848fcbc0da64cf3.exe 32 PID 456 wrote to memory of 2824 456 3d6258aff21a972ac848fcbc0da64cf3.exe 32 PID 3860 wrote to memory of 224 3860 cmd.exe 15 PID 3860 wrote to memory of 224 3860 cmd.exe 15 PID 3860 wrote to memory of 224 3860 cmd.exe 15 PID 2824 wrote to memory of 2332 2824 cmd.exe 28 PID 2824 wrote to memory of 2332 2824 cmd.exe 28 PID 2824 wrote to memory of 2332 2824 cmd.exe 28 PID 1080 wrote to memory of 1484 1080 cmd.exe 27 PID 1080 wrote to memory of 1484 1080 cmd.exe 27 PID 1080 wrote to memory of 1484 1080 cmd.exe 27 PID 224 wrote to memory of 4396 224 net.exe 26 PID 224 wrote to memory of 4396 224 net.exe 26 PID 224 wrote to memory of 4396 224 net.exe 26 PID 2332 wrote to memory of 4572 2332 net.exe 25 PID 2332 wrote to memory of 4572 2332 net.exe 25 PID 2332 wrote to memory of 4572 2332 net.exe 25 PID 1484 wrote to memory of 2852 1484 net.exe 24 PID 1484 wrote to memory of 2852 1484 net.exe 24 PID 1484 wrote to memory of 2852 1484 net.exe 24 PID 4624 wrote to memory of 3492 4624 51082.exe 22 PID 4624 wrote to memory of 3492 4624 51082.exe 22 PID 4624 wrote to memory of 3492 4624 51082.exe 22 PID 3492 wrote to memory of 3504 3492 cmd.exe 20 PID 3492 wrote to memory of 3504 3492 cmd.exe 20 PID 3492 wrote to memory of 3504 3492 cmd.exe 20 PID 3504 wrote to memory of 2828 3504 net.exe 16 PID 3504 wrote to memory of 2828 3504 net.exe 16 PID 3504 wrote to memory of 2828 3504 net.exe 16 PID 4624 wrote to memory of 4916 4624 51082.exe 85 PID 4624 wrote to memory of 4916 4624 51082.exe 85 PID 4624 wrote to memory of 4916 4624 51082.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d6258aff21a972ac848fcbc0da64cf3.exe"C:\Users\Admin\AppData\Local\Temp\3d6258aff21a972ac848fcbc0da64cf3.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\cmd.execmd /c "net start 51082"2⤵
- Suspicious use of WriteProcessMemory
PID:2824
-
-
C:\Windows\SysWOW64\51082.exeC:\Windows\system32\51082.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:400
-
-
C:\Windows\SysWOW64\net.exenet start 510821⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start 510822⤵PID:4396
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start 510821⤵PID:2828
-
C:\Windows\SysWOW64\net.exenet start 510821⤵
- Suspicious use of WriteProcessMemory
PID:3504
-
C:\Windows\SysWOW64\cmd.execmd /c "net start 51082"1⤵
- Suspicious use of WriteProcessMemory
PID:3492
-
C:\Windows\SysWOW64\51082.exeC:\Windows\SysWOW64\51082.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\61CA1.exeC:\Windows\system32\61CA1.exe eee2⤵
- Executes dropped EXE
PID:4916
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start 510821⤵PID:2852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start 510821⤵PID:4572
-
C:\Windows\SysWOW64\net.exenet start 510821⤵
- Suspicious use of WriteProcessMemory
PID:1484
-
C:\Windows\SysWOW64\net.exenet start 510821⤵
- Suspicious use of WriteProcessMemory
PID:2332
-
C:\Windows\SysWOW64\cmd.execmd /c "net start 51082"1⤵
- Suspicious use of WriteProcessMemory
PID:1080
-
C:\Windows\SysWOW64\cmd.execmd /c "net start 51082"1⤵
- Suspicious use of WriteProcessMemory
PID:3860