Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 22:22
Behavioral task
behavioral1
Sample
420eac7ea76416c718f9405e7fc93d44.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
420eac7ea76416c718f9405e7fc93d44.exe
Resource
win10v2004-20231222-en
General
-
Target
420eac7ea76416c718f9405e7fc93d44.exe
-
Size
14KB
-
MD5
420eac7ea76416c718f9405e7fc93d44
-
SHA1
c0bbbfe51dd7d6fc30acef13986709f0cd0f44ca
-
SHA256
f2a1bc980d1d377289fbdab0ee43b6766678c2b3cf2c6fd348af3720f3b3cc4f
-
SHA512
9ebf433f851cbe7efda350854ffdb8f1233b86c9aae562c75aae5058de8398686996c81d1cd62c150d4d8c2555050489a4d1cefe4d2d3610f16d06dec5f360c8
-
SSDEEP
384:3ohDW84sghLbZzdNt2asVmob+bCfyPf/CoXsakU:CW84sghLbZzFHvodfmfKocak
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4816 wonlinsk.exe -
resource yara_rule behavioral2/memory/2912-0-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/files/0x0007000000023213-5.dat upx behavioral2/memory/2912-6-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4816-7-0x0000000000400000-0x0000000000411000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wonlinsk.exe 420eac7ea76416c718f9405e7fc93d44.exe File created C:\Windows\SysWOW64\wonlins.dll 420eac7ea76416c718f9405e7fc93d44.exe File created C:\Windows\SysWOW64\wonlinsk.exe 420eac7ea76416c718f9405e7fc93d44.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2912 wrote to memory of 4816 2912 420eac7ea76416c718f9405e7fc93d44.exe 27 PID 2912 wrote to memory of 4816 2912 420eac7ea76416c718f9405e7fc93d44.exe 27 PID 2912 wrote to memory of 4816 2912 420eac7ea76416c718f9405e7fc93d44.exe 27 PID 2912 wrote to memory of 4752 2912 420eac7ea76416c718f9405e7fc93d44.exe 107 PID 2912 wrote to memory of 4752 2912 420eac7ea76416c718f9405e7fc93d44.exe 107 PID 2912 wrote to memory of 4752 2912 420eac7ea76416c718f9405e7fc93d44.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\420eac7ea76416c718f9405e7fc93d44.exe"C:\Users\Admin\AppData\Local\Temp\420eac7ea76416c718f9405e7fc93d44.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\wonlinsk.exeC:\Windows\system32\wonlinsk.exe ˜‰2⤵
- Executes dropped EXE
PID:4816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\420eac7ea76416c718f9405e7fc93d44.exe.bat2⤵PID:4752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD58615240ff9f59005cb6dfc4f78e23a55
SHA1079d1462e90b07d1c12ccc973f064afd014a4f46
SHA25661c6f7daa89074d59c9280927ab2d89240c2ec2a35063e423bd8da65a782df97
SHA51256064b8e749e3e29e7e4945fbf78a7f8d191b46ed8585ba52529cc9c47d135610ee5f8d3ee345f9779e4709c0edb5127b52d35c7b382d1d2b9a10423d38fb36d
-
Filesize
14KB
MD5420eac7ea76416c718f9405e7fc93d44
SHA1c0bbbfe51dd7d6fc30acef13986709f0cd0f44ca
SHA256f2a1bc980d1d377289fbdab0ee43b6766678c2b3cf2c6fd348af3720f3b3cc4f
SHA5129ebf433f851cbe7efda350854ffdb8f1233b86c9aae562c75aae5058de8398686996c81d1cd62c150d4d8c2555050489a4d1cefe4d2d3610f16d06dec5f360c8