Analysis
-
max time kernel
151s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 01:38
Behavioral task
behavioral1
Sample
668f3687903216c2a12cc6fe4927730f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
668f3687903216c2a12cc6fe4927730f.exe
Resource
win10v2004-20231215-en
General
-
Target
668f3687903216c2a12cc6fe4927730f.exe
-
Size
12KB
-
MD5
668f3687903216c2a12cc6fe4927730f
-
SHA1
b2baf2c4ca58dd1252305a645ad18fa7f626b809
-
SHA256
0fae9132cc06644454acd27497e0024e2d0791010a8825f7983ee9e80f224de4
-
SHA512
5fb217fb09d6cd77ddc38eaf0c5a333588fd22d2e62aa9d9551e3ac2dcbc2125b3a02dd3c0480fcb72361df706d192d27dd047afb66e93362845da2cf071338e
-
SSDEEP
192:cF/gTB1qgt/LBsgMUZAhQF7ZK5VrsOXlZE/WtlyETeTBMnsgel/krcaLA7Dq8:cF/g3RhLZGAVK3rsOXD1lyDTBJgelELU
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2668 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2148 fliecodsk.exe -
Loads dropped DLL 2 IoCs
pid Process 2408 668f3687903216c2a12cc6fe4927730f.exe 2408 668f3687903216c2a12cc6fe4927730f.exe -
resource yara_rule behavioral1/memory/2408-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000b000000012267-3.dat upx behavioral1/memory/2408-4-0x0000000000230000-0x000000000023F000-memory.dmp upx behavioral1/memory/2148-12-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2408-13-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\fliecods.dll 668f3687903216c2a12cc6fe4927730f.exe File created C:\Windows\SysWOW64\fliecodsk.exe 668f3687903216c2a12cc6fe4927730f.exe File opened for modification C:\Windows\SysWOW64\fliecodsk.exe 668f3687903216c2a12cc6fe4927730f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2148 2408 668f3687903216c2a12cc6fe4927730f.exe 28 PID 2408 wrote to memory of 2148 2408 668f3687903216c2a12cc6fe4927730f.exe 28 PID 2408 wrote to memory of 2148 2408 668f3687903216c2a12cc6fe4927730f.exe 28 PID 2408 wrote to memory of 2148 2408 668f3687903216c2a12cc6fe4927730f.exe 28 PID 2408 wrote to memory of 2668 2408 668f3687903216c2a12cc6fe4927730f.exe 29 PID 2408 wrote to memory of 2668 2408 668f3687903216c2a12cc6fe4927730f.exe 29 PID 2408 wrote to memory of 2668 2408 668f3687903216c2a12cc6fe4927730f.exe 29 PID 2408 wrote to memory of 2668 2408 668f3687903216c2a12cc6fe4927730f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\668f3687903216c2a12cc6fe4927730f.exe"C:\Users\Admin\AppData\Local\Temp\668f3687903216c2a12cc6fe4927730f.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\fliecodsk.exeC:\Windows\system32\fliecodsk.exe ˜‰2⤵
- Executes dropped EXE
PID:2148
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\668f3687903216c2a12cc6fe4927730f.exe.bat2⤵
- Deletes itself
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5d9bd0418d526a0794b008bbacea5b947
SHA1a8a85866dccc458474af8a5c815819279de82cb9
SHA256231c1debd92e2eeddfb48505c4857d2d101fda8d85ab6f40785c8c9d4d65191b
SHA5127659eeed5bae1add252664f69827a087e0ae842964079a6a54d5470f8d11fd9a613021f842586e96175ac8b792f475f02613a86d65a937be653b295706138423
-
Filesize
12KB
MD5668f3687903216c2a12cc6fe4927730f
SHA1b2baf2c4ca58dd1252305a645ad18fa7f626b809
SHA2560fae9132cc06644454acd27497e0024e2d0791010a8825f7983ee9e80f224de4
SHA5125fb217fb09d6cd77ddc38eaf0c5a333588fd22d2e62aa9d9551e3ac2dcbc2125b3a02dd3c0480fcb72361df706d192d27dd047afb66e93362845da2cf071338e