Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 07:59
Behavioral task
behavioral1
Sample
74278ef34cf92d18e19ebec97f17bcd1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
74278ef34cf92d18e19ebec97f17bcd1.exe
Resource
win10v2004-20231222-en
General
-
Target
74278ef34cf92d18e19ebec97f17bcd1.exe
-
Size
10KB
-
MD5
74278ef34cf92d18e19ebec97f17bcd1
-
SHA1
5613cad4d4e5d61902fa26ba5ddd8150c219b015
-
SHA256
45cba05a15bd89f978a8ab5eb04c8866a6d3a331eeae95f2b2f940dc37e6a629
-
SHA512
2c2591f7ea2bb6f93a8af16712149672b8b13fde419b24340d83cd4a2065c9da1ffd67da22cef299ce087d1e62e0014c95f896fff2d8eec7cf25b25116d37f66
-
SSDEEP
192:b3+AEaXB7FbvmK8cp1Li5kRHhEmopggjr6bsg:aAfxBDmdY1qIfoVg
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2504 rmbsonyk.exe -
resource yara_rule behavioral2/memory/3584-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x0007000000023229-4.dat upx behavioral2/memory/3584-6-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/2504-7-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rmbsonyk.exe 74278ef34cf92d18e19ebec97f17bcd1.exe File created C:\Windows\SysWOW64\rmbsony.dll 74278ef34cf92d18e19ebec97f17bcd1.exe File created C:\Windows\SysWOW64\rmbsonyk.exe 74278ef34cf92d18e19ebec97f17bcd1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3584 wrote to memory of 2504 3584 74278ef34cf92d18e19ebec97f17bcd1.exe 87 PID 3584 wrote to memory of 2504 3584 74278ef34cf92d18e19ebec97f17bcd1.exe 87 PID 3584 wrote to memory of 2504 3584 74278ef34cf92d18e19ebec97f17bcd1.exe 87 PID 3584 wrote to memory of 5776 3584 74278ef34cf92d18e19ebec97f17bcd1.exe 98 PID 3584 wrote to memory of 5776 3584 74278ef34cf92d18e19ebec97f17bcd1.exe 98 PID 3584 wrote to memory of 5776 3584 74278ef34cf92d18e19ebec97f17bcd1.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\74278ef34cf92d18e19ebec97f17bcd1.exe"C:\Users\Admin\AppData\Local\Temp\74278ef34cf92d18e19ebec97f17bcd1.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\rmbsonyk.exeC:\Windows\system32\rmbsonyk.exe ˜‰2⤵
- Executes dropped EXE
PID:2504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\74278ef34cf92d18e19ebec97f17bcd1.exe.bat2⤵PID:5776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5b2e85f267db3f457dea16cdebca4657d
SHA1d3ea2834b3aa81f1fbbe07dc2b5aaa592b734299
SHA256d0252b7c5007f8a20cfd3a95bffd49055b7b38cc97e5c91a0c05725bd9607330
SHA512a973fa4254d868cfa0d6ace6e4d9bb85b48876ad677dc694e0088d28df58c593d1fa440d515377a287268f2ccfc4fcda5c80dfeadfd632a3d8dfcbda7b36a84f
-
Filesize
10KB
MD574278ef34cf92d18e19ebec97f17bcd1
SHA15613cad4d4e5d61902fa26ba5ddd8150c219b015
SHA25645cba05a15bd89f978a8ab5eb04c8866a6d3a331eeae95f2b2f940dc37e6a629
SHA5122c2591f7ea2bb6f93a8af16712149672b8b13fde419b24340d83cd4a2065c9da1ffd67da22cef299ce087d1e62e0014c95f896fff2d8eec7cf25b25116d37f66