Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
7e1dc6c1672136881d28b29f6099d3cf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e1dc6c1672136881d28b29f6099d3cf.exe
Resource
win10v2004-20231215-en
General
-
Target
7e1dc6c1672136881d28b29f6099d3cf.exe
-
Size
40KB
-
MD5
7e1dc6c1672136881d28b29f6099d3cf
-
SHA1
7201dc4c68729aa2f6ddf957d58b22d6a1872e32
-
SHA256
25cde21d4af68b0c02e82e0970546d7676b49cf5571ee31a0a8f5fc993102b73
-
SHA512
7f2652c97121922e6b8392093f55823256345baacdd95eb8381f3ef4b02a595935cdfb087dd2d1d0b93160f30aab8e95f13c52d3efc84a0529d3d0ee6cb2d2ad
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHQ/A:aqk/Zdic/qjh8w19JDHv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1772 services.exe -
resource yara_rule behavioral2/files/0x0007000000023130-4.dat upx behavioral2/memory/1772-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1772-13-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1772-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1772-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1772-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1772-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1772-27-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1772-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1772-35-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1772-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1772-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1772-202-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1772-203-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1772-206-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1772-210-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 7e1dc6c1672136881d28b29f6099d3cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 7e1dc6c1672136881d28b29f6099d3cf.exe File opened for modification C:\Windows\java.exe 7e1dc6c1672136881d28b29f6099d3cf.exe File created C:\Windows\java.exe 7e1dc6c1672136881d28b29f6099d3cf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 208 wrote to memory of 1772 208 7e1dc6c1672136881d28b29f6099d3cf.exe 84 PID 208 wrote to memory of 1772 208 7e1dc6c1672136881d28b29f6099d3cf.exe 84 PID 208 wrote to memory of 1772 208 7e1dc6c1672136881d28b29f6099d3cf.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e1dc6c1672136881d28b29f6099d3cf.exe"C:\Users\Admin\AppData\Local\Temp\7e1dc6c1672136881d28b29f6099d3cf.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
147KB
MD533515692a1204f106af308bf8615dd39
SHA1234d6a9829a906c3ff14baa730841d0d3acadb6d
SHA25622201b72a7ed50cde34e482375777bd8740960535bdeea97c875b1e280672645
SHA5121ca769abc3fcebc104283f0bc8db923fb89e778da6f309973c20a2c2cb1356ef756c68d1f4ac45bf63326b253c9c1ae3d5fd5849c4d204467a589aaf0b2e871a
-
Filesize
147KB
MD521ecd9fde3de93fce2027f890faa7e60
SHA176f378a621e14ae104815ef4643df89c619e9a26
SHA2565430dcb3b54106ad493f9b144fb3dde190402da0d470f4f18e39f3ea3b263330
SHA51241488179a952daf02d2522eb64aea6ca9e915bea67afad19f9f571e0a31f6e71b8a935f1aec07fcd2699c12f115b96c5be00a21036a2e378a63f72d67fcdbd0d
-
Filesize
40KB
MD538fd5009778be0c5fa3cd1a7a4d72cf8
SHA1a3563a2a02041263e783b6bc2c6e919c9ea6c20c
SHA2568121cf75a216213a29f3292f992f15a978c72f515b416a75be8cf295c8f85e42
SHA5126a392d9175f413621e2c15fa229e9c44eecfd0549d4beea522d54345b69eef8cee3047002e7c0bc98460fdc3e02ae54f2a8fcf2c9f75a7207954716224cdc3a0
-
Filesize
1KB
MD5a9de4c95ab2fe7a6c8d4f41774c0619c
SHA1ba2c41eb2a13ffbf96a043532a88ca9d9d95508f
SHA25664989be07098bb5b3b5c11cb7a4cbb599dd5662912e095817c44638a6a286d51
SHA512193d336a28e1b179e91d68368948da67bac7e77b3fce789b1fdd5feb9dbd3b33ed81a4170dd73a055323074de14007b531a5d8460e2ece628113077979bc70a3
-
Filesize
1KB
MD572f0d3eb69156887906262ba57a6622a
SHA1961708be2b3d953d214dd4adad8d1a22d495c080
SHA2563b51c59d774df172800cb49e8f5bc5a8a7ea25113f2b42f17f13e762ffec29c6
SHA5121a2add0e19a929b5b1018ee66f30f70ed977a1efc251c62124b7cc59212998c326752e517b87e4f559420a6cc8dab6ca6885fe4b61e0a2126fe4477c24ae4f94
-
Filesize
1KB
MD525258ed6de7f8ba99d4bad96dc4b9e33
SHA102d6d90f7b593bb0a0dc6194b1e757f2cf49d748
SHA256db76d94161f19548bd466f0f2f76e6135f90475bdabd09bb66d8d3ad56d17dba
SHA512204197117ce3be656852d26ac18bf38d4c94e74c32c952950df36b82b429ddc42a24b1dac3340ad9abab81c70e74e4f77935c41647e068f920743d843be2c010
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2