Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 09:58
Behavioral task
behavioral1
Sample
71edd6f77fdcff571bb0aed2377dd841.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
71edd6f77fdcff571bb0aed2377dd841.exe
Resource
win10v2004-20231215-en
General
-
Target
71edd6f77fdcff571bb0aed2377dd841.exe
-
Size
11KB
-
MD5
71edd6f77fdcff571bb0aed2377dd841
-
SHA1
c9c5dc37941f396aa468b13960349ef0cb475780
-
SHA256
dface1d6dbb263a681606509dff1e19abcb5ac0566f2a26b4bd6cc2972136b6c
-
SHA512
0dbe2b84cc00516c7a4a62eb8de3f4ef722de9a17e252f2efdc6dbd0828ce7d5ec78e9776db35f6da273bcfd7cc8fb1e33c64c5496581d9fdf6318d76b52eeca
-
SSDEEP
192:3hPjdoOGNMIhLlWuJBi4NCmF8uBd6DWJ0iDT9d5tprjpKw122r8kiLM:3h5oOGNMIhLguJBlNCmladiv9dVAw9rN
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4200 appmick.exe -
resource yara_rule behavioral2/memory/1144-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0006000000023118-4.dat upx behavioral2/memory/1144-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/4200-7-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\appmic.dll 71edd6f77fdcff571bb0aed2377dd841.exe File created C:\Windows\SysWOW64\appmick.exe 71edd6f77fdcff571bb0aed2377dd841.exe File opened for modification C:\Windows\SysWOW64\appmick.exe 71edd6f77fdcff571bb0aed2377dd841.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1144 wrote to memory of 4200 1144 71edd6f77fdcff571bb0aed2377dd841.exe 88 PID 1144 wrote to memory of 4200 1144 71edd6f77fdcff571bb0aed2377dd841.exe 88 PID 1144 wrote to memory of 4200 1144 71edd6f77fdcff571bb0aed2377dd841.exe 88 PID 1144 wrote to memory of 2924 1144 71edd6f77fdcff571bb0aed2377dd841.exe 97 PID 1144 wrote to memory of 2924 1144 71edd6f77fdcff571bb0aed2377dd841.exe 97 PID 1144 wrote to memory of 2924 1144 71edd6f77fdcff571bb0aed2377dd841.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\71edd6f77fdcff571bb0aed2377dd841.exe"C:\Users\Admin\AppData\Local\Temp\71edd6f77fdcff571bb0aed2377dd841.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\appmick.exeC:\Windows\system32\appmick.exe ˜‰2⤵
- Executes dropped EXE
PID:4200
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\71edd6f77fdcff571bb0aed2377dd841.exe.bat2⤵PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5c252a7746469d5a6e96d37206a65f88c
SHA1c301e79db958dc5f17f058b4dbfef2057b579838
SHA2568a9cd7d46fccc927ae9e61172a59418aeb894ac65ff3b633e746270ab42339d5
SHA512451f73fc1a946fc68e769eeb86289d0e9246360375578fd51608fca2248931b4fc0e4cecfcc3506d8da7dde76c1e1b42ab4b7d0c9a3ffa5a55016f09b890f7ab
-
Filesize
11KB
MD571edd6f77fdcff571bb0aed2377dd841
SHA1c9c5dc37941f396aa468b13960349ef0cb475780
SHA256dface1d6dbb263a681606509dff1e19abcb5ac0566f2a26b4bd6cc2972136b6c
SHA5120dbe2b84cc00516c7a4a62eb8de3f4ef722de9a17e252f2efdc6dbd0828ce7d5ec78e9776db35f6da273bcfd7cc8fb1e33c64c5496581d9fdf6318d76b52eeca