Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 01:48
Static task
static1
Behavioral task
behavioral1
Sample
711f728f257dba4b0a7e394d92b0a55a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
711f728f257dba4b0a7e394d92b0a55a.exe
Resource
win10v2004-20231222-en
General
-
Target
711f728f257dba4b0a7e394d92b0a55a.exe
-
Size
208KB
-
MD5
711f728f257dba4b0a7e394d92b0a55a
-
SHA1
28bd8a67527f6c77cdf849a8069b5667c94d84e3
-
SHA256
ba912bd741770fa27e54e36dfaffb5bba9d84eadbd117269e0e9c96f7fa781bd
-
SHA512
91354c080d5fbf43c0f3f3ff9ff6a6c86329469475cc9c5b7317aabbb712e72f2224937d35ebd3e995a1407de0d1d24a7dabdded0208a6ce827d6a0f3e59c33f
-
SSDEEP
3072:yluy78nwop7tNy+BxNE4JV5Ad1W/kPkfWZozsW22XN16U+ylU9FZjJQuhyAeac:ylNgwMNEC5Xs8fbzU2d1cymjJ1hm
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2092 u.dll 3052 u.dll 3040 mpress.exe -
Loads dropped DLL 6 IoCs
pid Process 3000 cmd.exe 3000 cmd.exe 3000 cmd.exe 3000 cmd.exe 3052 u.dll 3052 u.dll -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 880 wrote to memory of 3000 880 711f728f257dba4b0a7e394d92b0a55a.exe 20 PID 880 wrote to memory of 3000 880 711f728f257dba4b0a7e394d92b0a55a.exe 20 PID 880 wrote to memory of 3000 880 711f728f257dba4b0a7e394d92b0a55a.exe 20 PID 880 wrote to memory of 3000 880 711f728f257dba4b0a7e394d92b0a55a.exe 20 PID 3000 wrote to memory of 2092 3000 cmd.exe 19 PID 3000 wrote to memory of 2092 3000 cmd.exe 19 PID 3000 wrote to memory of 2092 3000 cmd.exe 19 PID 3000 wrote to memory of 2092 3000 cmd.exe 19 PID 3000 wrote to memory of 3052 3000 cmd.exe 33 PID 3000 wrote to memory of 3052 3000 cmd.exe 33 PID 3000 wrote to memory of 3052 3000 cmd.exe 33 PID 3000 wrote to memory of 3052 3000 cmd.exe 33 PID 3052 wrote to memory of 3040 3052 u.dll 31 PID 3052 wrote to memory of 3040 3052 u.dll 31 PID 3052 wrote to memory of 3040 3052 u.dll 31 PID 3052 wrote to memory of 3040 3052 u.dll 31 PID 3000 wrote to memory of 1928 3000 cmd.exe 32 PID 3000 wrote to memory of 1928 3000 cmd.exe 32 PID 3000 wrote to memory of 1928 3000 cmd.exe 32 PID 3000 wrote to memory of 1928 3000 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\711f728f257dba4b0a7e394d92b0a55a.exe"C:\Users\Admin\AppData\Local\Temp\711f728f257dba4b0a7e394d92b0a55a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\703.tmp\vir.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3052
-
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 711f728f257dba4b0a7e394d92b0a55a.exe.com -include s.dll -overwrite -nodelete1⤵
- Executes dropped EXE
PID:2092
-
C:\Users\Admin\AppData\Local\Temp\22EC.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\22EC.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe22ED.tmp"1⤵
- Executes dropped EXE
PID:3040
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
1KB
MD50e6f20d352ab0d9455d8ffae428ab173
SHA183c1e1e1db657037bef3307638acf61e6f9426b0
SHA2568414fb6aebe5e56139d1263274c5564dd281e93191cad3fc28497646fd5f07e6
SHA512b423ba715de8ef630025d86dd3d8c23fb6b63a50b5154242edeceb6d587e0fbc2eeb0fbb30a687aadeefd76a70cfaf0efabc3be16c987ac2a47368e3749d0263
-
Filesize
41KB
MD5cfb6c23b4ec82cb8a0c562d2b9f34c23
SHA1c7b496195abf2cceb09d8536768d83ab4aed6687
SHA25628feed5f31044cbc96b185cd8ac0b12cffbc848b895ffce7d4005e25f7a8faff
SHA51255a2e71b87db5af46c90eab14f95534d0deed807e91c4a52fb762141972a051633decedaf41b19b857efe8fd24821b59e15b33c9e00073da094495ea316420ac
-
Filesize
207KB
MD532055716063cff214b0bbf4cba6fdfb8
SHA1415604c4d786a0d16d4c52e2ca70dd17d6f47b08
SHA2562c615c0c5466fa007f3f1e418750e3473d0768d8f8553a1bec5bd835b43f112b
SHA5123796bdd21a1baab94c388d01533857fb1f1d1a9e0fbba16b00e455b639196393fd5c214e4a2104d150fa193637673f308ae46438562e7c26344f0437a6dc3a21
-
Filesize
741KB
MD5e653069049d71dc2927db71477a04e4b
SHA1ae424f3cfca1b22a7a82a5b9ab7ed5bbc890b262
SHA256cc29fe690b323d174113ac13ea3e795e386cca389a6b33e9dfcf093afc0dbaa0
SHA5129befbd7cf23fb79eed0c1946576dc7098203a6fc15e932612ca28fb66467c1a4228be7a7d7251a5d86c14f9b707048e5b1799f31f45513bf909b608aa00301ec
-
Filesize
64KB
MD50017226cae2302dd872c4d17938939d1
SHA1c28f6cb3ef6edc7be6c6ca74d3ca476f0d42d58f
SHA25600a2ffdbbb01b9c11b7afbdc87b8ab551c1a7f6e52faf928d36952d6818d40c7
SHA512ca04f8a0d093f8b399250402b17bdd59d04aef3d33c839ef84f12643e833d751703668e45a4ce3ade13fe793caccf9dbec7eeafd6886293bbf21fa941c4ca8e2
-
Filesize
449KB
MD50902edf24a876c94d2e514d0cc74ed26
SHA14eaba65fa7e1bf5846ac6a2ff6d6f061bd3c9d15
SHA2567636e0127239e2cf179486f6a1c7bf92bb8315039319040af620d41cf2ffd9cb
SHA512dc016b6966e44f25b347a128c97fe7fa766660f2615e36be0b13d9e7552836cb5dcdcae42fce84f5eedfafa617b60281a4f90efbf22d414d1287a2535a238810
-
Filesize
319KB
MD568b9ca145f45b3dd75f8a7aed63d933e
SHA1671bdaf5d5f748f5893e37a062045cedcea7b10e
SHA2562f1679a1d72ada2bdad8897960e9e50e03fdbeba294347b925e2a27f0c7b52a2
SHA5123708bfbc1a598c57afe4bfdf027b7b526d0e08cff233ebde960cb3c09c12d3f9ffa6bdb3e1e4d6ef0c67bb2c81f8e79dfd0c5a9fe5b1aba3fdf16126fe549ef8
-
Filesize
226KB
MD5b4724a9779092b04386ef889b85187f4
SHA139472da12262f694dcbfa6b23803a6cdc2bea7b6
SHA256b5bd0f0c3b345d180b28e263b76def7170b5fbe333949b1bf3baf87ed26e8678
SHA512ee7faf965e776e65e9b2ac229e8a8e88c0b6d2804b009ce42a700b5dd7b4cff2cadefba5d202888be846c748c45212ab8b5849421bffd5cdd068747882d15cc2
-
Filesize
111KB
MD50b518964c4be3ca9f8b016f352236046
SHA135e2bc166644c9acd118c9b194eee50921544a22
SHA2561e53b50a12a00ac2696b95cb46341973dfd506981a5eb051f6578e964c7fc3a4
SHA5121e331358158a5a2675768fd67e3b8a0ab066dda61f8399e558892c95f8c47ebb1d6c4c27d9275b3908e83a32a5ff97aef11a1c40c25bdf0a1b50d73eef5c933c
-
Filesize
1KB
MD503fa4a4fe611c1b99f560d99383789f7
SHA180e0611e87254a6018f2d5db5eb155b9bc7148a6
SHA256ef7ed36f0ada8b0dd04b897b90f05a2214f8eb3bf1d6465c8dd8ac1e389db82d
SHA51230bb590c10dfa0bddb5fd516f7618dd30f2726199696be7dd1a944abb96b42662505edb908741cee858fb91f9bc5d445a4880a05d8bbd767ff86769c3ee7de0b
-
Filesize
1KB
MD5162330991bc17f93f5df92d32f92b5a0
SHA1ab282edd227ff4f3042e51de6d9417a33d99fb93
SHA256fa6b0c068bd29ddbc8301b5c61744c9ad1802ff357600e5554c9a60284a50e8c
SHA51240171bb234a44177f4c799b49bf8794d57e1e6b03a279128c0b6d0080a819dc420cfc26126be4cc94233ae734b2c1ca1eaa44a22d0a0e223fcd7c64969b9ec15
-
Filesize
51KB
MD58d5d71a24ecec040b475cfb57381f564
SHA14d2370bd8afab4e0eafc2dc4b01c0d3d19550620
SHA256a6a3639f477cb6b8734a3ad3bdfb5f935a3da27efa79ff5c93403dc8e415a1d2
SHA5128303f3676d8c4e1ffa5ab81f75461aef8ffa35f8b9ba23f4d90d34d8ba171694e4d920477bb8bc63f0ff7c65592997a08074c257dfe97822e25e0232edf47d96
-
Filesize
305KB
MD55cb766e260a600610689bf8dccde6c5a
SHA10b2a03e3c6937e42fafea3b1edaedce1589b4a07
SHA2567b39350c38112c2d56aa6dba449e420abd132e8a31379573cfba54ce4492f499
SHA5124b9b4b28f4ad1b3f58ccaaac1377686a0400e486c8b68b4a5bb85bb3a9a9f9b79739730f812f65ffe695b02b946deeffa52679907d853ff97487bec3ef846b10
-
Filesize
394KB
MD57a9f354503ac82d2e948b1a7f27ad534
SHA18476e70264e8ec634ae18a01aea83bd9620ab48e
SHA256ad8723e68465841be240d7221298370f8c13c9d2f1d777ed73b5ec262c0cb852
SHA512cb6b369c4039c546a06b1e7bdd2c3b25c3575500b6c8e232ea740b937703823c1371d088e3bd3001d5f4167ffac3308c11e77b1db9d7f7d1c8d4ea7412fd102f
-
Filesize
700KB
MD50ba8f8311fc3afbb7e32d98236f2efa6
SHA1956dd3548df11f2c6c36366d74109ddddc33fc33
SHA2565b6da37dd4f1fa6402e7ee652ef048f7bd7b396f7a3b3f61c56865d5cd3f6e62
SHA512706f455d004af6d1442402c1a750a37da14da0351c51d0b0b578349355956986941c4a302956590be7c2b00caa6838e3b265dab8766e8636e0c6c4527b82c4e2