Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2024 22:55
Behavioral task
behavioral1
Sample
599faa3835c02686483fa8b03a9df79c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
599faa3835c02686483fa8b03a9df79c.exe
Resource
win10v2004-20231215-en
General
-
Target
599faa3835c02686483fa8b03a9df79c.exe
-
Size
11KB
-
MD5
599faa3835c02686483fa8b03a9df79c
-
SHA1
baf36203c7f1c6b9965db83367e3a4744e33557c
-
SHA256
8ae14923da560d96f51d83b829f00fb05d387544db008afc224a57449edfb03d
-
SHA512
72f3e35b8bfeb898be5b00af855f294b3b941e11d25eff77462e7374a32b0ccd5a05a4abc85e8cd7a8c1cd76c3fe10e0aac93db6368478fbe74cea0940bcb83e
-
SSDEEP
192:82OdpCvccuSM3KWjnjnie3HPNFODY3TQQxA1fIpT0MgcAAId28/idgbxUZ0aYD2:82CCkcbM3KWjjx/ODY3T3xRppg5pIsij
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 3960 xsiscok.exe -
resource yara_rule behavioral2/memory/664-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0008000000023210-4.dat upx behavioral2/memory/664-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/3960-7-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xsiscok.exe 599faa3835c02686483fa8b03a9df79c.exe File created C:\Windows\SysWOW64\xsisco.dll 599faa3835c02686483fa8b03a9df79c.exe File created C:\Windows\SysWOW64\xsiscok.exe 599faa3835c02686483fa8b03a9df79c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 664 wrote to memory of 3960 664 599faa3835c02686483fa8b03a9df79c.exe 88 PID 664 wrote to memory of 3960 664 599faa3835c02686483fa8b03a9df79c.exe 88 PID 664 wrote to memory of 3960 664 599faa3835c02686483fa8b03a9df79c.exe 88 PID 664 wrote to memory of 4924 664 599faa3835c02686483fa8b03a9df79c.exe 103 PID 664 wrote to memory of 4924 664 599faa3835c02686483fa8b03a9df79c.exe 103 PID 664 wrote to memory of 4924 664 599faa3835c02686483fa8b03a9df79c.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\599faa3835c02686483fa8b03a9df79c.exe"C:\Users\Admin\AppData\Local\Temp\599faa3835c02686483fa8b03a9df79c.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\xsiscok.exeC:\Windows\system32\xsiscok.exe ˜‰2⤵
- Executes dropped EXE
PID:3960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\599faa3835c02686483fa8b03a9df79c.exe.bat2⤵PID:4924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD56e3a760b2ecc657fd97f6bc478278495
SHA1c7e0144602a6df85867ee0d0b9b7fbb093d1d3c6
SHA2566153f5cc4a9a46ae1b1f911dcae98b144ba4cf0b722821384f1e5393b37a8e2c
SHA512e379ebedd3bd3198911f23af841d50d1373df463e5994a6466d63a16163564316246d53a93782d67f740cffd6b8bb7e5c2690fc61d0aaef7bc87388e4749e811
-
Filesize
11KB
MD5599faa3835c02686483fa8b03a9df79c
SHA1baf36203c7f1c6b9965db83367e3a4744e33557c
SHA2568ae14923da560d96f51d83b829f00fb05d387544db008afc224a57449edfb03d
SHA51272f3e35b8bfeb898be5b00af855f294b3b941e11d25eff77462e7374a32b0ccd5a05a4abc85e8cd7a8c1cd76c3fe10e0aac93db6368478fbe74cea0940bcb83e