Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2024, 04:43
Behavioral task
behavioral1
Sample
5c2a626920fe21d6cbcd3d3eceae4bd8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5c2a626920fe21d6cbcd3d3eceae4bd8.exe
Resource
win10v2004-20231222-en
General
-
Target
5c2a626920fe21d6cbcd3d3eceae4bd8.exe
-
Size
92KB
-
MD5
5c2a626920fe21d6cbcd3d3eceae4bd8
-
SHA1
54bcd11b2c7685415aa887accd4187e4b4ab451f
-
SHA256
c1bed15febcb0c3a2d70753191685f621dbf8b8ed3574ed89d652834b68a962b
-
SHA512
a9820f4d6d7fce4da96144be4ed45a1c6ac5522f87829072e474c9198419965b54903f5a401260041e2c440c2e2ee3034cc55ef25751a952ab892eca34d38226
-
SSDEEP
1536:QvdRpxpVVxXgEJEBUTL3LD95duLvs+gvt23x2yK+RZxbfhE9IaZv98IPxj/fwyhr:KRpHVVhgknLRnuTZgF2vtRq9ISbPxj/U
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 736 taskmngr.exe 4988 taskmngr.exe 932 taskmngr.exe 2448 taskmngr.exe 4968 taskmngr.exe -
resource yara_rule behavioral2/memory/1140-0-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/1140-4-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/files/0x00030000000228ab-3.dat upx behavioral2/memory/736-6-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/736-9-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/4988-10-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/4988-11-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/4988-14-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/932-15-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/2448-19-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/932-18-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/2448-20-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/4968-24-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/2448-23-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/4968-25-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/2532-66-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/4968-65-0x0000000000400000-0x00000000004D6000-memory.dmp upx -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe 5c2a626920fe21d6cbcd3d3eceae4bd8.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe 5c2a626920fe21d6cbcd3d3eceae4bd8.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1140 5c2a626920fe21d6cbcd3d3eceae4bd8.exe 1140 5c2a626920fe21d6cbcd3d3eceae4bd8.exe 1140 5c2a626920fe21d6cbcd3d3eceae4bd8.exe 1140 5c2a626920fe21d6cbcd3d3eceae4bd8.exe 1140 5c2a626920fe21d6cbcd3d3eceae4bd8.exe 1140 5c2a626920fe21d6cbcd3d3eceae4bd8.exe 1140 5c2a626920fe21d6cbcd3d3eceae4bd8.exe 1140 5c2a626920fe21d6cbcd3d3eceae4bd8.exe 1140 5c2a626920fe21d6cbcd3d3eceae4bd8.exe 1140 5c2a626920fe21d6cbcd3d3eceae4bd8.exe 1140 5c2a626920fe21d6cbcd3d3eceae4bd8.exe 1140 5c2a626920fe21d6cbcd3d3eceae4bd8.exe 736 taskmngr.exe 736 taskmngr.exe 736 taskmngr.exe 736 taskmngr.exe 736 taskmngr.exe 736 taskmngr.exe 736 taskmngr.exe 736 taskmngr.exe 736 taskmngr.exe 736 taskmngr.exe 736 taskmngr.exe 736 taskmngr.exe 4988 taskmngr.exe 4988 taskmngr.exe 4988 taskmngr.exe 4988 taskmngr.exe 4988 taskmngr.exe 4988 taskmngr.exe 4988 taskmngr.exe 4988 taskmngr.exe 4988 taskmngr.exe 4988 taskmngr.exe 4988 taskmngr.exe 4988 taskmngr.exe 932 taskmngr.exe 932 taskmngr.exe 932 taskmngr.exe 932 taskmngr.exe 932 taskmngr.exe 932 taskmngr.exe 932 taskmngr.exe 932 taskmngr.exe 932 taskmngr.exe 932 taskmngr.exe 932 taskmngr.exe 932 taskmngr.exe 2448 taskmngr.exe 2448 taskmngr.exe 2448 taskmngr.exe 2448 taskmngr.exe 2448 taskmngr.exe 2448 taskmngr.exe 2448 taskmngr.exe 2448 taskmngr.exe 2448 taskmngr.exe 2448 taskmngr.exe 2448 taskmngr.exe 2448 taskmngr.exe 4968 taskmngr.exe 4968 taskmngr.exe 4968 taskmngr.exe 4968 taskmngr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1140 wrote to memory of 736 1140 5c2a626920fe21d6cbcd3d3eceae4bd8.exe 95 PID 1140 wrote to memory of 736 1140 5c2a626920fe21d6cbcd3d3eceae4bd8.exe 95 PID 1140 wrote to memory of 736 1140 5c2a626920fe21d6cbcd3d3eceae4bd8.exe 95 PID 736 wrote to memory of 4988 736 taskmngr.exe 101 PID 736 wrote to memory of 4988 736 taskmngr.exe 101 PID 736 wrote to memory of 4988 736 taskmngr.exe 101 PID 4988 wrote to memory of 932 4988 taskmngr.exe 103 PID 4988 wrote to memory of 932 4988 taskmngr.exe 103 PID 4988 wrote to memory of 932 4988 taskmngr.exe 103 PID 932 wrote to memory of 2448 932 taskmngr.exe 105 PID 932 wrote to memory of 2448 932 taskmngr.exe 105 PID 932 wrote to memory of 2448 932 taskmngr.exe 105 PID 2448 wrote to memory of 4968 2448 taskmngr.exe 113 PID 2448 wrote to memory of 4968 2448 taskmngr.exe 113 PID 2448 wrote to memory of 4968 2448 taskmngr.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c2a626920fe21d6cbcd3d3eceae4bd8.exe"C:\Users\Admin\AppData\Local\Temp\5c2a626920fe21d6cbcd3d3eceae4bd8.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe -bai C:\Users\Admin\AppData\Local\Temp\5c2a626920fe21d6cbcd3d3eceae4bd8.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe -bai C:\Windows\SysWOW64\taskmngr.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe -bai C:\Windows\SysWOW64\taskmngr.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe -bai C:\Windows\SysWOW64\taskmngr.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe -bai C:\Windows\SysWOW64\taskmngr.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4968 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe -bai C:\Windows\SysWOW64\taskmngr.exe7⤵PID:2532
-
-
-
-
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2664
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:1100
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD55c2a626920fe21d6cbcd3d3eceae4bd8
SHA154bcd11b2c7685415aa887accd4187e4b4ab451f
SHA256c1bed15febcb0c3a2d70753191685f621dbf8b8ed3574ed89d652834b68a962b
SHA512a9820f4d6d7fce4da96144be4ed45a1c6ac5522f87829072e474c9198419965b54903f5a401260041e2c440c2e2ee3034cc55ef25751a952ab892eca34d38226