Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 01:47
Behavioral task
behavioral1
Sample
47b5bab5ad9e47772df1096b7f2253de.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47b5bab5ad9e47772df1096b7f2253de.exe
Resource
win10v2004-20231215-en
General
-
Target
47b5bab5ad9e47772df1096b7f2253de.exe
-
Size
14KB
-
MD5
47b5bab5ad9e47772df1096b7f2253de
-
SHA1
737a17c2303024656891712df56a32e917f4b739
-
SHA256
6163072906e48aa52a85bfed50e0f6ed757a3a58ef3a9d9a50543453cc57cdc4
-
SHA512
92c901b13ac0978c800170a703902d2238879243dd6f9699e5fbc491644f1c03ad5042009740e7d34bd6599b0c1eefbee8c6b629b7b67b18c2f22eddb173c803
-
SSDEEP
384:ImHBse9eTnP7xChPQy3vq5C8qYK+7XwCRNOvtTrP:ImHuseTnP7chrZ8KZcotTr
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2772 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1828 xuntxnk.exe -
Loads dropped DLL 2 IoCs
pid Process 2108 47b5bab5ad9e47772df1096b7f2253de.exe 2108 47b5bab5ad9e47772df1096b7f2253de.exe -
resource yara_rule behavioral1/memory/2108-0-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral1/files/0x000d000000012325-3.dat upx behavioral1/memory/1828-11-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral1/memory/2108-19-0x0000000000400000-0x0000000000411000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\xuntxn.dll 47b5bab5ad9e47772df1096b7f2253de.exe File created C:\Windows\SysWOW64\xuntxnk.exe 47b5bab5ad9e47772df1096b7f2253de.exe File opened for modification C:\Windows\SysWOW64\xuntxnk.exe 47b5bab5ad9e47772df1096b7f2253de.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2108 47b5bab5ad9e47772df1096b7f2253de.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1828 2108 47b5bab5ad9e47772df1096b7f2253de.exe 28 PID 2108 wrote to memory of 1828 2108 47b5bab5ad9e47772df1096b7f2253de.exe 28 PID 2108 wrote to memory of 1828 2108 47b5bab5ad9e47772df1096b7f2253de.exe 28 PID 2108 wrote to memory of 1828 2108 47b5bab5ad9e47772df1096b7f2253de.exe 28 PID 2108 wrote to memory of 2772 2108 47b5bab5ad9e47772df1096b7f2253de.exe 29 PID 2108 wrote to memory of 2772 2108 47b5bab5ad9e47772df1096b7f2253de.exe 29 PID 2108 wrote to memory of 2772 2108 47b5bab5ad9e47772df1096b7f2253de.exe 29 PID 2108 wrote to memory of 2772 2108 47b5bab5ad9e47772df1096b7f2253de.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\47b5bab5ad9e47772df1096b7f2253de.exe"C:\Users\Admin\AppData\Local\Temp\47b5bab5ad9e47772df1096b7f2253de.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\xuntxnk.exeC:\Windows\system32\xuntxnk.exe ˜‰2⤵
- Executes dropped EXE
PID:1828
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\47b5bab5ad9e47772df1096b7f2253de.exe.bat2⤵
- Deletes itself
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173B
MD5a698010cea691e70e2bec3d63197cffb
SHA11a5b6d05d7d738360685fffbe4a80989bdf6e71a
SHA25657dd44b2437cff5200d482995aed13e007bdd0661a3cbe992bf69bbcddfa0e9f
SHA512a45668531a2fe73103eb8e352740ad787faf8b2a9a0666188f0a980e8c155dcf523d41eaaf7417029f7c67d646c19ea4689a50136be8bc420d4221861d68eeed
-
Filesize
14KB
MD547b5bab5ad9e47772df1096b7f2253de
SHA1737a17c2303024656891712df56a32e917f4b739
SHA2566163072906e48aa52a85bfed50e0f6ed757a3a58ef3a9d9a50543453cc57cdc4
SHA51292c901b13ac0978c800170a703902d2238879243dd6f9699e5fbc491644f1c03ad5042009740e7d34bd6599b0c1eefbee8c6b629b7b67b18c2f22eddb173c803