Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-01-2024 06:07
Static task
static1
Behavioral task
behavioral1
Sample
5a7ac00c716ebc8cb7ee2364b36d6c76.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a7ac00c716ebc8cb7ee2364b36d6c76.exe
Resource
win10v2004-20231215-en
General
-
Target
5a7ac00c716ebc8cb7ee2364b36d6c76.exe
-
Size
209KB
-
MD5
5a7ac00c716ebc8cb7ee2364b36d6c76
-
SHA1
ae5e0c162d660ecae3586fe15315e4ea5871adf8
-
SHA256
da0d430e386771421f2cfd7ce17cbbec0790ec1eae58e08374251231d0880a9a
-
SHA512
80acb0d58dafee3f3c060a71a2b9d0ab38aba567e599f0b6f25277ec60d79e55446772c1164dd23ae6defa6ca2399ee3544c9c9bf436903d756a1590fa5fde5d
-
SSDEEP
3072:UlqalmxV3uH5boSTROKTLOLLYSPqum9azjzzTCGPvbLmlTQegS:UljIxwZrROK3ELXium9GjzzTnPk
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2784 u.dll 2536 mpress.exe 2520 u.dll -
Loads dropped DLL 6 IoCs
pid Process 2744 cmd.exe 2744 cmd.exe 2784 u.dll 2784 u.dll 2744 cmd.exe 2744 cmd.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2744 2188 5a7ac00c716ebc8cb7ee2364b36d6c76.exe 29 PID 2188 wrote to memory of 2744 2188 5a7ac00c716ebc8cb7ee2364b36d6c76.exe 29 PID 2188 wrote to memory of 2744 2188 5a7ac00c716ebc8cb7ee2364b36d6c76.exe 29 PID 2188 wrote to memory of 2744 2188 5a7ac00c716ebc8cb7ee2364b36d6c76.exe 29 PID 2744 wrote to memory of 2784 2744 cmd.exe 30 PID 2744 wrote to memory of 2784 2744 cmd.exe 30 PID 2744 wrote to memory of 2784 2744 cmd.exe 30 PID 2744 wrote to memory of 2784 2744 cmd.exe 30 PID 2784 wrote to memory of 2536 2784 u.dll 31 PID 2784 wrote to memory of 2536 2784 u.dll 31 PID 2784 wrote to memory of 2536 2784 u.dll 31 PID 2784 wrote to memory of 2536 2784 u.dll 31 PID 2744 wrote to memory of 2520 2744 cmd.exe 32 PID 2744 wrote to memory of 2520 2744 cmd.exe 32 PID 2744 wrote to memory of 2520 2744 cmd.exe 32 PID 2744 wrote to memory of 2520 2744 cmd.exe 32 PID 2744 wrote to memory of 2900 2744 cmd.exe 33 PID 2744 wrote to memory of 2900 2744 cmd.exe 33 PID 2744 wrote to memory of 2900 2744 cmd.exe 33 PID 2744 wrote to memory of 2900 2744 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a7ac00c716ebc8cb7ee2364b36d6c76.exe"C:\Users\Admin\AppData\Local\Temp\5a7ac00c716ebc8cb7ee2364b36d6c76.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\78A9.tmp\vir.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 5a7ac00c716ebc8cb7ee2364b36d6c76.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\7AEA.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\7AEA.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe7AEB.tmp"4⤵
- Executes dropped EXE
PID:2536
-
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
PID:2520
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵PID:2900
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD504bbffa685f04b371ed9838012355b9d
SHA1f6196bd4318a58fe514c7e41b7a9b6dcf0791690
SHA2560d71f811e4393d996db1ddeb219c0d88ce48733c80ffbb4fb2585aceeb53d756
SHA5122aa80d091a145fe199c7455874535014ee01662a112bcf5a26679e7dc12f408e61984ed340f918478f87a44d991582309bfdde3110ac97313e7269e0f3f0bf05
-
Filesize
42KB
MD58897e0427a4fb009fec3a8e73ea422b3
SHA167efc15790a67e963718364ad1b8461e8f2bdb48
SHA2563955466e17d2c17882d8664aecc0bb9554a7cd9c9bc0a00d2c8549ddc0c575b3
SHA5124b9f23f6988b5b52ea59f2ec05f2767f0106a6a91b1fd9b9a822caa7a5764c6c10869d8acdde7837fe60be2b861f70fa41ebca7554305bab6c5636017e7e4e27
-
Filesize
743KB
MD535d48e0370ee81407b0f834652b46afa
SHA11e76e7c87c904767b176d5ea742952894e1b8d6e
SHA256d1629a0569e96825a2be1d2af73596c08d31420690431987691fb3ba670ba56b
SHA51281c84fe08a3a7b1a755fbb689d08b36decc6b46ee9167ae5747cce034d1395d5793c039c495980aad9c6a3c2d048a614f06010ef74d2b039de3ebd723e5a3778
-
Filesize
208KB
MD500abb69c65767d11fa29d16de42c13a8
SHA10d4331f8f20cb534d53f064036f3fc08b7c41817
SHA2562fe67138b5c7ec225a31939c1796314db399877ff2613512ea412e7acbc45b30
SHA512fd4296e58dbd7023da48c4dabc9223bdfa0aad9f96d5f2fea8acbb9456461d9c9f340a352b4180b593bc4c2d5695f3bc58d22cb0869dd00990923f75a372eb7c
-
Filesize
41KB
MD5bfffa6c36b0aa15510a443a79382ede1
SHA1af44603bd5cad266d5e1b681691c56a25b603e58
SHA25654cc6b298d45fffa6b9198fa5d4b5793c6248f887feaed2b928c6c400fb7a22b
SHA512381efd97ac75a95ec229955d82d6d4fc9019de88ecf7f58e9f550dd4a002d57ce03983dfdb3286782685d15740388e2d0bd6de50753a0b224dae10b0ebcda486
-
Filesize
700KB
MD503cfde8f9aa4a9e26520da9a85faca40
SHA145a3dc2ab8aa420c19922b1783a9f19e695da4e6
SHA25693a3c30195dc710c1469f5fd364fe3e1866878b0055ee942ef23c19602664379
SHA512e264531bbb9912785010f0368627937d33a6173e8c5b7b7d8f15809c018e2cfd799ec6182ecdb17f3f98c142b3bc0b475c1e625febd14805f7ff9a68ad6b2133
-
Filesize
1KB
MD5287408504d8c0646f832c6cfb99e3fe8
SHA1ddf260d8c203e246246c1284af8e7a0d7d1a019c
SHA2562ad57a1d7af5e659a05bb32fa108a3326fdcb7f872a60b36d204bc7e05a8b0c0
SHA5120efe56e00206f0fd9ad1fe94fa4c2234840996e3ea7d1238671918a55249685c74d239940a0b9ea49040e6ac0940700b56045e067ae985a181c014f7d5583c5b
-
Filesize
1KB
MD53ec8af5f0f76bf9a724eaf0021dc0066
SHA1ea5c887d7bb50fc5f22e494c2cff03740a893f0a
SHA2563300c03d2c03c942aeb00f592ed14a9e52456f6b5312e6d68075e82c206a5201
SHA512f900f140a4c16f0106f77410e79b182136b81373f8129a3327d73c40bec6decf0b70f1cb4e303ef7a014f219a8122c755f3518f578fbcdca8f0d23a3b95d77f8
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e