Analysis
-
max time kernel
145s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
725b61480c6994435da8b6709fce4ff9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
725b61480c6994435da8b6709fce4ff9.exe
Resource
win10v2004-20231215-en
General
-
Target
725b61480c6994435da8b6709fce4ff9.exe
-
Size
208KB
-
MD5
725b61480c6994435da8b6709fce4ff9
-
SHA1
0c68323831ef958ae9b33f9633a15adfd31d3935
-
SHA256
0c45c9d707afac5887a1d9e7a3820d1095a5d8ac5d891a2bd2f2e744f62f201c
-
SHA512
40aa72ba7d6a73b8ec3237248dbd921727d317776a08d89d5a5e998fea7bfd78a187ab9522264b570a688c9e8364c9e49a4e3e6d3a7f733984055c0bbefbfe57
-
SSDEEP
6144:OlVCjnYbZosEhj7m+6VWW22BNsG/Gz+S:1j5HhHH6brUz+S
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3380 u.dll 4972 mpress.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings calc.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings calc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1528 OpenWith.exe 4552 OpenWith.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4820 wrote to memory of 4740 4820 725b61480c6994435da8b6709fce4ff9.exe 88 PID 4820 wrote to memory of 4740 4820 725b61480c6994435da8b6709fce4ff9.exe 88 PID 4820 wrote to memory of 4740 4820 725b61480c6994435da8b6709fce4ff9.exe 88 PID 4740 wrote to memory of 3380 4740 cmd.exe 90 PID 4740 wrote to memory of 3380 4740 cmd.exe 90 PID 4740 wrote to memory of 3380 4740 cmd.exe 90 PID 3380 wrote to memory of 4972 3380 u.dll 91 PID 3380 wrote to memory of 4972 3380 u.dll 91 PID 3380 wrote to memory of 4972 3380 u.dll 91 PID 4740 wrote to memory of 1912 4740 cmd.exe 92 PID 4740 wrote to memory of 1912 4740 cmd.exe 92 PID 4740 wrote to memory of 1912 4740 cmd.exe 92 PID 4740 wrote to memory of 3568 4740 cmd.exe 94 PID 4740 wrote to memory of 3568 4740 cmd.exe 94 PID 4740 wrote to memory of 3568 4740 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\725b61480c6994435da8b6709fce4ff9.exe"C:\Users\Admin\AppData\Local\Temp\725b61480c6994435da8b6709fce4ff9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FCA0.tmp\vir.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 725b61480c6994435da8b6709fce4ff9.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\460.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\460.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe461.tmp"4⤵
- Executes dropped EXE
PID:4972
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵
- Modifies registry class
PID:1912
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵
- Modifies registry class
PID:3568
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1528
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4552
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
1KB
MD5263a6bcbda82395880886fbf32d6f019
SHA1b070d4a5aee829c6ee48c2a35f238a51e197a6bd
SHA256d273eb7a76bd99713582c5c5280e667b353e41ef68b4c554633bab6f9e3e8ab6
SHA512bf95ff414ea077b31effa931a6bef98fdcab95e8aee75423a8ea949088499899e9c49b56cdd8ada717d99668f41dfcfa0da6a1a45d27c6bc8706f1586c41cb88
-
Filesize
41KB
MD50702e8031193a3474afa297d17cdc814
SHA146cd098f940f31e43b4a606603a0c153cdba950d
SHA2569e596558228cdc87835f78d9072bdf2c25d3646e0541b3ac5e070dbb136cb116
SHA512213f4d9187c0fcafaab34f0f91df5a2172a1f67e4750bc247552f430ec95a4c035f43be7421f2fd63da963a0044a6fcf343123dc34b5e26ece2cf9a54137ef94
-
Filesize
24KB
MD585008b6387188c6e102e3ee8122392a3
SHA1ec1fb93088e10b24eabe2005d3d18446792f07e1
SHA256197048083e00ce70d9e0ddd6d38d7b92c72da6914b01bf5fcd2d7db799a194f7
SHA51296ef1df93e1bfcd170333e6a2b7b07b55ce3f85eecbd7ea17e07be9f910d068f4f4b758084c034ab326d79a52d0b779f3542de1ee01abffd1938c669e664cb5b
-
Filesize
700KB
MD5110ae9a995a0e99df2427f7b97b85eb2
SHA13655d0a5ce029e0bbc4d942e477e5be1745ee63b
SHA25625d07cade85c1a9495bebf0a1f37447fda7401fe4e9d92869ababf83a46b240c
SHA5124646debc7c8489219c4578bfeb568e178f33e2a589f649ae4ae6ed39a77ffd0a0fc0a401c5279758f975f99a9f777c18cc8e1aadb62c5ce16217e27fc644ded2
-
Filesize
1KB
MD5071ae745e84b0d5442ae13f3cad95fa0
SHA1c388797f55b3d2d79d98269e8ada3e71ea44b653
SHA2561e607cbb251a803198effaa72957bbd357e54f5839e28345adec11d805281ec5
SHA512dd6c34692842214ec101469302f0f622b1ea54c6dba11bbe6fd94ea4b22d9b6effc64da9eef00866e54c8e0b58619e61ac9b515120e62908635c9f061881ea52