Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-02-2024 04:21
Static task
static1
Behavioral task
behavioral1
Sample
download.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
download.exe
Resource
win10v2004-20231222-en
General
-
Target
download.exe
-
Size
203KB
-
MD5
ddc256f409bf0b8e9647497da0c02077
-
SHA1
5f17007371a209876bec6e467fbbab7634cb93b6
-
SHA256
5114a34a00f9cb4273df0778733e2ffb006f74a065ecc0e82311f6ceb8bd2e09
-
SHA512
d4d10039597dcdde99d8b25e4c5bcaad7514dc54f2296220e7fd108e02030b926943f53d2c622f8212340f48c9568dc000432a8ab83052c64c15c3bcfc4eed12
-
SSDEEP
3072:rBAp5XhKpN4eOyVTGfhEClj8jTk+0hJ8D4RD0c0rpOdt/46KC5NV/2iBY:WbXE9OiTGfhEClq9YKXcP7/UCpS
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2244 WScript.exe 5 2244 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\a\222\dd11\kokoloda.da download.exe File opened for modification C:\Program Files (x86)\a\222\1a8.bat download.exe File opened for modification C:\Program Files (x86)\a\222\dd11\8546f9rtrty464b17.vbs download.exe File opened for modification C:\Program Files (x86)\a\222\dd11\0a93c4e8557cb61c55ee.vbs download.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1572 wrote to memory of 2792 1572 download.exe 28 PID 1572 wrote to memory of 2792 1572 download.exe 28 PID 1572 wrote to memory of 2792 1572 download.exe 28 PID 1572 wrote to memory of 2792 1572 download.exe 28 PID 1572 wrote to memory of 2244 1572 download.exe 30 PID 1572 wrote to memory of 2244 1572 download.exe 30 PID 1572 wrote to memory of 2244 1572 download.exe 30 PID 1572 wrote to memory of 2244 1572 download.exe 30 PID 1572 wrote to memory of 2032 1572 download.exe 31 PID 1572 wrote to memory of 2032 1572 download.exe 31 PID 1572 wrote to memory of 2032 1572 download.exe 31 PID 1572 wrote to memory of 2032 1572 download.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\download.exe"C:\Users\Admin\AppData\Local\Temp\download.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\a\222\1a8.bat" "2⤵
- Drops file in Drivers directory
PID:2792
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\a\222\dd11\0a93c4e8557cb61c55ee.vbs"2⤵
- Blocklisted process makes network request
PID:2244
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\a\222\dd11\8546f9rtrty464b17.vbs"2⤵
- Drops file in Drivers directory
PID:2032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5de147ce6ba1d1943dafb2e5f863516a4
SHA1a090f0df6ba6874d2d1380efcc2d471854f6d86a
SHA256df3746b241d470e51ce2d1c1c87ba8f4c1fb7598712c37b7a8bc37dd79e2378d
SHA512e197eda48fc1e720d4839f13112dec4e8bfc1932b6168e812cca8326cc9dd4b9cd583285da00d3e6bc455d11e33e015a3b134b65389f2e0eb72691315b145bba
-
Filesize
512B
MD547d274be3586757ba8e79a432db848a3
SHA14f53bd2d2308849fe993e3a475a7bccd430d5d81
SHA256bf04ec8c40ffe1281422fe5944bad405587c6ad1ee4226f85b0915c8b573add1
SHA5124b90229cd9ac8ee81c9dce0292dc3881d6d7028525e77b412e138a6fc44fa5236518c419865a093440c27dbd00bbbc58326619122138ace6c35f89b123c68175
-
Filesize
638B
MD5bb461184f044aca28b37faec5030b29a
SHA11f712dd2138a0a1c64f3da2881b22cedffa0c7a3
SHA2568869ea1e9535b4e846c39458e121b625b08781748fe004a81bd91552ddffacf8
SHA512329fdc364d6f44e67ecc17f38eafcd8a0a5315bb729d4a067779d35596ba417a3b90cdf8100dc0774ddf3fdef4a91c62ebd8f9c87bf04e55e8fef6f3052aec66
-
Filesize
91B
MD5fdf80ba0d1c8aecbe41796eda51c2ca7
SHA1f23f744f124d18444586c39f2a4eeaef5ee295a8
SHA25655e136d79fef1b1e38269f95b57c4fb4637dd4909d3765886672a820afbf5f3b
SHA512fdfa96e64551f03d79bc62612cdb1b5a3059fc7d9d77d5c5a9141cb3e3910effd98d4e6711b70a0dad8e6785a4fa3bd171f6bbd384d82285406b7e2537c2d784
-
Filesize
1KB
MD58b4fcc57447eb585a0c58bbf25c95d4a
SHA17ed2636f75019d489a0618c2faad9148ab6709d8
SHA256294873a0ca32766a925daab324720adf10307dff6c0fd7532eacc50563114f39
SHA512969f8d4e80a54e48c99e563c8fa71ec76f574087d93da36b4a051fb179c7fd9182515228916c9924b35b92fd65d6b5e9dab145de03dca58f7394e6373ae069a8
-
Filesize
1KB
MD5d3fb08f5c670ac93c13de5621034466f
SHA1199901a7805f143647461d376216d5610e49dba9
SHA25618e1aceb1a462039c5e228c0500eeb6508bd1c557c58ff9ada8a4ec20d7e0ecd
SHA5121b120c0aed4c845b21f7a61ca7dad78a391b58c469086e78fac554a465c4f9e9aab9496afc20d0e18ce5c0aa828858acbb82b9dd1ebd521b1e31498a580ac6c1