Analysis
-
max time kernel
151s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
4faa6a6714f2b48b7c03898fb4ec89bb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4faa6a6714f2b48b7c03898fb4ec89bb.exe
Resource
win10v2004-20231215-en
General
-
Target
4faa6a6714f2b48b7c03898fb4ec89bb.exe
-
Size
40KB
-
MD5
4faa6a6714f2b48b7c03898fb4ec89bb
-
SHA1
64fc3d84d745951ac2d4dd73dd6eadfcf1ec04fb
-
SHA256
5dbc5fabb587a7cb3dd932315549e02573243bebed1a02662aab6f89d2a72700
-
SHA512
68d82abb7bef4e202f4198bbf2bf12e69716f008fa929eec4cc1103d03a2b41581d32dc6a038fd33bef74f401824a47b62c8db34a63f6f665c37d4ae751262df
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHUq:aqk/Zdic/qjh8w19JDHb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2056 services.exe -
resource yara_rule behavioral1/files/0x0009000000012266-7.dat upx behavioral1/memory/2056-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2116-4-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2056-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2056-23-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2056-27-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2056-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2056-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2056-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2056-37-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2056-61-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2056-64-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2056-65-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2056-69-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2056-73-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2056-74-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2056-78-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 4faa6a6714f2b48b7c03898fb4ec89bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 4faa6a6714f2b48b7c03898fb4ec89bb.exe File opened for modification C:\Windows\java.exe 4faa6a6714f2b48b7c03898fb4ec89bb.exe File created C:\Windows\java.exe 4faa6a6714f2b48b7c03898fb4ec89bb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2056 2116 4faa6a6714f2b48b7c03898fb4ec89bb.exe 28 PID 2116 wrote to memory of 2056 2116 4faa6a6714f2b48b7c03898fb4ec89bb.exe 28 PID 2116 wrote to memory of 2056 2116 4faa6a6714f2b48b7c03898fb4ec89bb.exe 28 PID 2116 wrote to memory of 2056 2116 4faa6a6714f2b48b7c03898fb4ec89bb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4faa6a6714f2b48b7c03898fb4ec89bb.exe"C:\Users\Admin\AppData\Local\Temp\4faa6a6714f2b48b7c03898fb4ec89bb.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5025e120b84c9c7956bc67380a8e0338a
SHA119c96ebf6f32f3cad3671def7ad8b343cb67c7cc
SHA256d135e7c3e1c82be44d950c5d89f48578e8d8534062e9f067b15c49674976a11a
SHA51294fdcb8d9c6a8d6be642d4d244209ae2d7e0b424790f282db833176b3a6423c98c7243d5dac96dd096acfa0554bcaab60d086568f6686a8c0ec2eb9b93d376b2
-
Filesize
1KB
MD5e9e675b1c567343527ed43a69d3d4f11
SHA16d2872ab224f24ef493daba3d00971059b926b7c
SHA2568c9f83e9dbf7826267e3e6a217e3143d5eeebbfd24ca94ce4238df357da27c67
SHA51287001fe50a8df9cfcb0c47ad45a74b0f72585925dce785a3a964b5a7d02b8d91509ce280ab4530db4891a479e6d5812c0c7be9ab4e6fce35727e8bd101844edd
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2