Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 09:08
Static task
static1
Behavioral task
behavioral1
Sample
45d7d53fd77223364708e70ac6a0b10a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
45d7d53fd77223364708e70ac6a0b10a.exe
Resource
win10v2004-20231215-en
General
-
Target
45d7d53fd77223364708e70ac6a0b10a.exe
-
Size
40KB
-
MD5
45d7d53fd77223364708e70ac6a0b10a
-
SHA1
b2d0b1178c7e98e4ccf5074edd7a5f18c67216a2
-
SHA256
806eaf5380791342029618d735d7a1b8565948b25715094a0fbe2d1efba6b4d3
-
SHA512
09a41d69d172dcfaa65aab08e5cd23f67556df0d6aa1e33b55079b3f23cfdc6a5fd5504bcbb9e50151f9ead3694dc9d7c2bc4929590816bd6b4d4b1aaf0b28c7
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHNg:aqk/Zdic/qjh8w19JDHNg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2948 services.exe -
resource yara_rule behavioral1/memory/1992-4-0x00000000001B0000-0x00000000001B8000-memory.dmp upx behavioral1/files/0x000d0000000122f6-7.dat upx behavioral1/memory/2948-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2948-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2948-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2948-27-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2948-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2948-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2948-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2948-37-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2948-41-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2948-64-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2948-65-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2948-69-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2948-73-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2948-74-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2948-78-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 45d7d53fd77223364708e70ac6a0b10a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 45d7d53fd77223364708e70ac6a0b10a.exe File opened for modification C:\Windows\java.exe 45d7d53fd77223364708e70ac6a0b10a.exe File created C:\Windows\java.exe 45d7d53fd77223364708e70ac6a0b10a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2948 1992 45d7d53fd77223364708e70ac6a0b10a.exe 28 PID 1992 wrote to memory of 2948 1992 45d7d53fd77223364708e70ac6a0b10a.exe 28 PID 1992 wrote to memory of 2948 1992 45d7d53fd77223364708e70ac6a0b10a.exe 28 PID 1992 wrote to memory of 2948 1992 45d7d53fd77223364708e70ac6a0b10a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\45d7d53fd77223364708e70ac6a0b10a.exe"C:\Users\Admin\AppData\Local\Temp\45d7d53fd77223364708e70ac6a0b10a.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5b424a6ef35f026653c8b0cfef30f7082
SHA175180208537d339e06b0fbd23dddb13efe5b72a7
SHA25608a8a114172a1667cab776c87884ed2294ecba61f0d4539b2af525291cb16164
SHA512023c2e813b739c21a917422f3b9125233d3a9524bee7fce8d15c3ba8b150d9b7d18bba7199cf783969d9cdce8ba237bee5ea9438f411a9c1d537e9a903a05930
-
Filesize
1KB
MD56fa02c470921fde2423cf278e954b1e2
SHA11aa5cc3bf92325490fe1e21dcebe1f1f165cf026
SHA256da5979b0014968b4b599269477dbb7c9f00ccb9a0d7842701cbaf67209a641c0
SHA512e5eb24e6e6a81d7137f6bc50995d28d4cc5dd4c88e635c31bdaad2abbb48a80498f9651b51bae31bdc206a84c9728090c04a42af0356ad45167abe63e4c7c7fe
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2