Analysis
-
max time kernel
142s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
488806365a2a0911408c682883b7b7ad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
488806365a2a0911408c682883b7b7ad.exe
Resource
win10v2004-20231215-en
General
-
Target
488806365a2a0911408c682883b7b7ad.exe
-
Size
209KB
-
MD5
488806365a2a0911408c682883b7b7ad
-
SHA1
be83f2db42215334d28dc8991762cca03aeac327
-
SHA256
32894a28236bb9400a375bef40fc928af67640fd3d216bcc9776bf00b5fb68fd
-
SHA512
22480f20cac87b0b2eda3c592869da6a125c8c34145a2c6bfcaf57881205149b38bb1f617092638a5e578883ca4ca7bd8ef95e8dd4fcd71695479332ac51e88d
-
SSDEEP
6144:wlGRgXm15ibLGHf7juW00byM7YOsIprxKhmYb:xv14GHfPuW00bmOsi0T
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2828 u.dll 2556 mpress.exe 1216 u.dll 2148 mpress.exe -
Loads dropped DLL 8 IoCs
pid Process 2696 cmd.exe 2696 cmd.exe 2828 u.dll 2828 u.dll 2696 cmd.exe 2696 cmd.exe 1216 u.dll 1216 u.dll -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2696 2180 488806365a2a0911408c682883b7b7ad.exe 29 PID 2180 wrote to memory of 2696 2180 488806365a2a0911408c682883b7b7ad.exe 29 PID 2180 wrote to memory of 2696 2180 488806365a2a0911408c682883b7b7ad.exe 29 PID 2180 wrote to memory of 2696 2180 488806365a2a0911408c682883b7b7ad.exe 29 PID 2696 wrote to memory of 2828 2696 cmd.exe 34 PID 2696 wrote to memory of 2828 2696 cmd.exe 34 PID 2696 wrote to memory of 2828 2696 cmd.exe 34 PID 2696 wrote to memory of 2828 2696 cmd.exe 34 PID 2828 wrote to memory of 2556 2828 u.dll 33 PID 2828 wrote to memory of 2556 2828 u.dll 33 PID 2828 wrote to memory of 2556 2828 u.dll 33 PID 2828 wrote to memory of 2556 2828 u.dll 33 PID 2696 wrote to memory of 1216 2696 cmd.exe 32 PID 2696 wrote to memory of 1216 2696 cmd.exe 32 PID 2696 wrote to memory of 1216 2696 cmd.exe 32 PID 2696 wrote to memory of 1216 2696 cmd.exe 32 PID 1216 wrote to memory of 2148 1216 u.dll 31 PID 1216 wrote to memory of 2148 1216 u.dll 31 PID 1216 wrote to memory of 2148 1216 u.dll 31 PID 1216 wrote to memory of 2148 1216 u.dll 31 PID 2696 wrote to memory of 2792 2696 cmd.exe 30 PID 2696 wrote to memory of 2792 2696 cmd.exe 30 PID 2696 wrote to memory of 2792 2696 cmd.exe 30 PID 2696 wrote to memory of 2792 2696 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\488806365a2a0911408c682883b7b7ad.exe"C:\Users\Admin\AppData\Local\Temp\488806365a2a0911408c682883b7b7ad.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5DD9.tmp\vir.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1216
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 488806365a2a0911408c682883b7b7ad.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2828
-
-
-
C:\Users\Admin\AppData\Local\Temp\601A.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\601A.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe601B.tmp"1⤵
- Executes dropped EXE
PID:2148
-
C:\Users\Admin\AppData\Local\Temp\5EA4.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\5EA4.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe5EA5.tmp"1⤵
- Executes dropped EXE
PID:2556
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50b519fd57abb84b2e71602fcd5579389
SHA17a1d1c07051a0169ed2479d70d58890ede362d55
SHA2564a186fd031e605cec95ee7e20814abda62388d86b3a0a4f89d4fe9deda585117
SHA512c8a95a9ed9d4232c0b7991d441e2fc0424f27881cb91463f045411d0e79981c372ec5f547ed33cd68aa1803d6e23753350e3b53ea9db8ace1823972af217b984
-
Filesize
57KB
MD5d335050c36c81c0057ceacbfdf9d9643
SHA15fbaf2c93b0207d96620d6c2273022d7baf528b3
SHA25629d3babcc7f059f611ef66042255675a778e588f89d1f853a72a5ad2ce4fc890
SHA5120d79c28b49a50053109bd2a50bfecc73549abbcd2fce52b559a99b5a8801c601c206ab874eac3e725e1dd3df849c5b3782244c97ad935a393e63e3ae194acdd7
-
Filesize
92KB
MD5ace4bef1eaa126302be21c4105cc6ea3
SHA1227744c90647355a13c84178f9fedac3f75fdb97
SHA2568a675772564f80e1e7c4e51cbb64e1ba19990a010b112abc5f050100a6765c66
SHA512b4909dc9aabd8f478717a08e14648bc131b6176ac794991bd174f61dff9c3d15b0635352cce622e8088515fafbc447dd15717b3c2001ba34f86a19ba2abc4029
-
Filesize
700KB
MD5e52e1dacca253a95205caebdf9ba61be
SHA189b934078b0ebb6045bcc17eee3395fc3af688ca
SHA256bc6123009aa8bb34968892ccdd73ef4470aea0651056a9c81e10c60185b81621
SHA51298cc05f9a24eb88d6c3be905c7870db5bc4d2b36c7a62abde8b2a4e3f2066bd715173c5b17d7066b8db049d6adba0a0b7a2214d3eb54a89ce5e1e97f6afcd4c0
-
Filesize
1KB
MD5e8db1743c61ef9a0bcc4c2909670e86e
SHA17c74d2e38505b50c9ff7c6bbade770c13d202445
SHA25668595c379108300fd6a12996dd6b7aa41f1f4cf5979eaac4d34aa29cad588234
SHA51263ded50454fd41baf0690dcd0c1da0c722b018e4ae19898cdc43742863a90cb101d0da6a6e1dac87be0ac475cf498121f37c0ce03d6b20ecb2effe51f4514f67
-
Filesize
13KB
MD59679056f9ba721ed5e6beb4656f20f20
SHA1858f9f75bfca4215f14b18cb20eb2df50c56cfc8
SHA2567c9a2e9d340e401b9a1bb0b1dc58ad6ecf17bc722bcf1809d5ae54efe45ac90e
SHA5126f781e66f29dfdf661e76a98e4971b00db822bc7577aed12b5d4d150fefd570dd4e37b0bf6909625f5ade1aae767302fdf0709e5ae7f1e959342ad00f375b930