Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 03:05
Behavioral task
behavioral1
Sample
7bfa2839513698f7c8a13f6af2a88544.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7bfa2839513698f7c8a13f6af2a88544.exe
Resource
win10v2004-20231215-en
General
-
Target
7bfa2839513698f7c8a13f6af2a88544.exe
-
Size
10KB
-
MD5
7bfa2839513698f7c8a13f6af2a88544
-
SHA1
c2930a6c5e1f9e2cf15e3df74aa0f0a5eb99c2a1
-
SHA256
2d3e0906193d98c20d2aa36992e54cd72e97db5c70623ae16e1f6627afbaebc3
-
SHA512
f53c6be0e392e2d1df4de3eae62a24a9e5850f56a956522f19f53475e7237daf3a79347d2aac6ce8dd4eb5b13bdb384a90aef9d70331840cd39a3879e982a80f
-
SSDEEP
192:m6kx1OI118VL/Z231VL0FHkGNOMYbaTftTD0sz:mpgI1aN/Z2PL0dECNDb
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2676 squallek.exe -
resource yara_rule behavioral2/memory/4120-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0006000000023134-3.dat upx behavioral2/memory/4120-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/2676-7-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\squallek.exe 7bfa2839513698f7c8a13f6af2a88544.exe File opened for modification C:\Windows\SysWOW64\squallek.exe 7bfa2839513698f7c8a13f6af2a88544.exe File created C:\Windows\SysWOW64\squalle.dll 7bfa2839513698f7c8a13f6af2a88544.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4120 wrote to memory of 2676 4120 7bfa2839513698f7c8a13f6af2a88544.exe 86 PID 4120 wrote to memory of 2676 4120 7bfa2839513698f7c8a13f6af2a88544.exe 86 PID 4120 wrote to memory of 2676 4120 7bfa2839513698f7c8a13f6af2a88544.exe 86 PID 4120 wrote to memory of 2596 4120 7bfa2839513698f7c8a13f6af2a88544.exe 98 PID 4120 wrote to memory of 2596 4120 7bfa2839513698f7c8a13f6af2a88544.exe 98 PID 4120 wrote to memory of 2596 4120 7bfa2839513698f7c8a13f6af2a88544.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bfa2839513698f7c8a13f6af2a88544.exe"C:\Users\Admin\AppData\Local\Temp\7bfa2839513698f7c8a13f6af2a88544.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\squallek.exeC:\Windows\system32\squallek.exe ˜‰2⤵
- Executes dropped EXE
PID:2676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\7bfa2839513698f7c8a13f6af2a88544.exe.bat2⤵PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5bd13140bd81ef55112c8fe6cc101fb89
SHA1162be329077c384762666c54df99e4c3e4dc1e07
SHA2563743e72ec7203d5686524912d392f833e657926a52c333c2a245997e42a7867f
SHA5123ced1369b02b7e1785086100576ab32df4223982e482271fac8d58a841ddb690eb90b2ec8f3d29a7ba4fdb80b2dba403b1a526d39e629c0fb6c2cd7e9872900b
-
Filesize
10KB
MD57bfa2839513698f7c8a13f6af2a88544
SHA1c2930a6c5e1f9e2cf15e3df74aa0f0a5eb99c2a1
SHA2562d3e0906193d98c20d2aa36992e54cd72e97db5c70623ae16e1f6627afbaebc3
SHA512f53c6be0e392e2d1df4de3eae62a24a9e5850f56a956522f19f53475e7237daf3a79347d2aac6ce8dd4eb5b13bdb384a90aef9d70331840cd39a3879e982a80f