Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 08:36
Static task
static1
Behavioral task
behavioral1
Sample
890d6442adfc92a8b4479bcf685d4c4d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
890d6442adfc92a8b4479bcf685d4c4d.exe
Resource
win10v2004-20231222-en
General
-
Target
890d6442adfc92a8b4479bcf685d4c4d.exe
-
Size
208KB
-
MD5
890d6442adfc92a8b4479bcf685d4c4d
-
SHA1
1d84cf46c68a8a6cd7d5332f99de4d28eb71ec63
-
SHA256
30cc562b25fc4a222022397885f7bf1fdd3a02fc7775172328e403d67b23b0a8
-
SHA512
f09387f47c627dd7ac0008817ca9b2046ed98c83d70e6a6aa910472472cb6129bc04594ac5ee55b9fb4bf52e78d56a56dcbafa75366aa286c3ac7e39833988c2
-
SSDEEP
6144:Ol0n6auQc8gLckTVZubHN2gc4E8NDFAbZNAz:pn6aujTot2eE8N5AvAz
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2980 u.dll 1180 mpress.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings calc.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings calc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3592 OpenWith.exe 1592 OpenWith.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1876 wrote to memory of 4832 1876 890d6442adfc92a8b4479bcf685d4c4d.exe 88 PID 1876 wrote to memory of 4832 1876 890d6442adfc92a8b4479bcf685d4c4d.exe 88 PID 1876 wrote to memory of 4832 1876 890d6442adfc92a8b4479bcf685d4c4d.exe 88 PID 4832 wrote to memory of 2980 4832 cmd.exe 90 PID 4832 wrote to memory of 2980 4832 cmd.exe 90 PID 4832 wrote to memory of 2980 4832 cmd.exe 90 PID 2980 wrote to memory of 1180 2980 u.dll 93 PID 2980 wrote to memory of 1180 2980 u.dll 93 PID 2980 wrote to memory of 1180 2980 u.dll 93 PID 4832 wrote to memory of 3412 4832 cmd.exe 94 PID 4832 wrote to memory of 3412 4832 cmd.exe 94 PID 4832 wrote to memory of 3412 4832 cmd.exe 94 PID 4832 wrote to memory of 876 4832 cmd.exe 96 PID 4832 wrote to memory of 876 4832 cmd.exe 96 PID 4832 wrote to memory of 876 4832 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\890d6442adfc92a8b4479bcf685d4c4d.exe"C:\Users\Admin\AppData\Local\Temp\890d6442adfc92a8b4479bcf685d4c4d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3EFD.tmp\vir.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 890d6442adfc92a8b4479bcf685d4c4d.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\4016.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\4016.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe4017.tmp"4⤵
- Executes dropped EXE
PID:1180
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵
- Modifies registry class
PID:3412
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵
- Modifies registry class
PID:876
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3592
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1592
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f93cbaea91ced1a39216fc5129702397
SHA14af464066bb33110557123fa7838677a1cff5d29
SHA256bd6f19e20de2cef1c552c98742652ee8fe63d89ac94f62122056065d12de84ae
SHA512b54e1279462f9b5df97b8d189585abcfeab128ce1a4e36b9f1432faf124f06b6ff454b567909e2c5a255334b2247d3ff96f23b0dffba9976dd66d8be2e994155
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
41KB
MD57aa367dca7be65e07b16bd69f06263e3
SHA1d447739251408f8e8490a9d307927bfbe41737ce
SHA256738bf50547320b0683af727ad6d430f2e7b83c846fe24f91527b7ee263bfa076
SHA512d7884589d7d12a628c9e07b77b3b793fa91f67fe13563e7b072ca864e053e6b7d711852e30ae1c877576b8ad47f67d2826e8ee711e6b65a329baa57492fe31b3
-
Filesize
24KB
MD57cda353434725a4a3712954fd3ded290
SHA1d8348e79d6bcee527743b126026367d700ddb436
SHA2567e781837fa89a8ead0a14c14a7f2125a89bb7b33d2ccc358f6b8ad22924b5e86
SHA5124ac257fe8e0772adc8aa1a2626153c473554c341c025959dd994100c43e2cec274e8a532e0c1b5c0ecdf463733d25a63767b995b731ce272b1c7a3ad0820b95d
-
Filesize
700KB
MD53c9568b0d86a865f9f73d9c0967cfdad
SHA13270df3e0e600f4df2c3cbc384837693a8a3a83e
SHA256c7b97a001b39e17382e929aad924555f3d21886b86aed38cffd660490801d1d6
SHA512bd423d1d57823b1bf6db42aeec199aa93178a9317ead85b42b60e091aaf4f73ce721bc07fda4750e112c4dccb9d87e21d5793965da9d6e92b0c5bed92c26876f
-
Filesize
1KB
MD554f1586c238428fb994e40c3640ea2bb
SHA1c651b6dbc02b0287617cc2a5d783ab73321969ba
SHA25683d0b726117e4524fdddf41fb7917627b2a8927b55f777b32a2b989de688c4de
SHA51225e5af3fae15c37ea6e0bd01bbcde1526c062fefdecb6293c52f933d57d807e6e96f0da47431f803d0941b34b2f1cd76055a6afb81f6c17b4f358518cb55d940