Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 18:47
Behavioral task
behavioral1
Sample
544bba2ee6b106b5c925f94f94ef1b80.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
544bba2ee6b106b5c925f94f94ef1b80.exe
Resource
win10v2004-20231222-en
General
-
Target
544bba2ee6b106b5c925f94f94ef1b80.exe
-
Size
13KB
-
MD5
544bba2ee6b106b5c925f94f94ef1b80
-
SHA1
c24c74af02fe4b197a50bbee8869e717b7f09228
-
SHA256
201e27ef992cab915c3c6126b2a91f3dbcd98992ef9ea966794f8cbca7c7a316
-
SHA512
90ca0aa079e5a775d05304a0471a9facc70404997575fd4328f0e8899cc4aedf76d6e5f0f51682aa968c7ac35d289dbcc395f372d121c211e61359486abdaf59
-
SSDEEP
192:bS+xmlwICQ7NX1X7ua0iGWiOjSjkmEjOWs7AdKXVI1Uqtz5k0aNJ:2CmpCQZlX6XiVewmIJsEKXM+0az
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1244 craoek.exe -
resource yara_rule behavioral2/memory/1852-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/files/0x000700000002320d-4.dat upx behavioral2/memory/1244-7-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/1852-6-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\craoek.exe 544bba2ee6b106b5c925f94f94ef1b80.exe File created C:\Windows\SysWOW64\craoe.dll 544bba2ee6b106b5c925f94f94ef1b80.exe File created C:\Windows\SysWOW64\craoek.exe 544bba2ee6b106b5c925f94f94ef1b80.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1852 wrote to memory of 1244 1852 544bba2ee6b106b5c925f94f94ef1b80.exe 24 PID 1852 wrote to memory of 1244 1852 544bba2ee6b106b5c925f94f94ef1b80.exe 24 PID 1852 wrote to memory of 1244 1852 544bba2ee6b106b5c925f94f94ef1b80.exe 24 PID 1852 wrote to memory of 1552 1852 544bba2ee6b106b5c925f94f94ef1b80.exe 104 PID 1852 wrote to memory of 1552 1852 544bba2ee6b106b5c925f94f94ef1b80.exe 104 PID 1852 wrote to memory of 1552 1852 544bba2ee6b106b5c925f94f94ef1b80.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\544bba2ee6b106b5c925f94f94ef1b80.exe"C:\Users\Admin\AppData\Local\Temp\544bba2ee6b106b5c925f94f94ef1b80.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\craoek.exeC:\Windows\system32\craoek.exe ˜‰2⤵
- Executes dropped EXE
PID:1244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\544bba2ee6b106b5c925f94f94ef1b80.exe.bat2⤵PID:1552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5737136718821bde744b4e7bf569487dc
SHA1c57621792d7dd8a255bc2616c3b8ba6b673f54cb
SHA2563e981d612bcea5147832e51ccc26e5431da7945838b7a09f7a56c9ff40f3db33
SHA512b73296d7a0508d78014629ee36de25c875e2b9adf87cb750d9c05667d4f6193b42092eecaadd5f0c008393c756532824830a62bc4bd5c612b6b111a5df637767
-
Filesize
13KB
MD5544bba2ee6b106b5c925f94f94ef1b80
SHA1c24c74af02fe4b197a50bbee8869e717b7f09228
SHA256201e27ef992cab915c3c6126b2a91f3dbcd98992ef9ea966794f8cbca7c7a316
SHA51290ca0aa079e5a775d05304a0471a9facc70404997575fd4328f0e8899cc4aedf76d6e5f0f51682aa968c7ac35d289dbcc395f372d121c211e61359486abdaf59