Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2024 15:10
Behavioral task
behavioral1
Sample
8ca54d050387fe40a057c34107a50a20.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ca54d050387fe40a057c34107a50a20.exe
Resource
win10v2004-20231215-en
General
-
Target
8ca54d050387fe40a057c34107a50a20.exe
-
Size
14KB
-
MD5
8ca54d050387fe40a057c34107a50a20
-
SHA1
04417c6d66eca7b6807f35bfdaf221d0f4a9de05
-
SHA256
79ea89088b8b3806ca84e19269dea76737a0f9daa5cf52de47b237139042286e
-
SHA512
607bce03389ff3c27ffee05b6e02ffcbfd72b951f43245499c43587f2f85911826597def4eccfd14d81b8820479be38c8ab7596e3b5f5f614a69cc5260bec10f
-
SSDEEP
192:6EeslRm+xma6IxOg83hkv9OYLs90i5nMq3uA7F21wkquMMvr3irOUruuBFpXUCq:6I9x4Iog8+oGiB++FBcr3sxruuBFpH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4740 ld08.exe -
resource yara_rule behavioral2/memory/2892-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/2892-11-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/4740-10-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/files/0x0006000000023223-9.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sysldtray = "c:\\windows\\ld08.exe" ld08.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification \??\c:\windows\ld08.exe 8ca54d050387fe40a057c34107a50a20.exe File created \??\c:\windows\ld08.exe 8ca54d050387fe40a057c34107a50a20.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2892 wrote to memory of 4740 2892 8ca54d050387fe40a057c34107a50a20.exe 84 PID 2892 wrote to memory of 4740 2892 8ca54d050387fe40a057c34107a50a20.exe 84 PID 2892 wrote to memory of 4740 2892 8ca54d050387fe40a057c34107a50a20.exe 84 PID 2892 wrote to memory of 2500 2892 8ca54d050387fe40a057c34107a50a20.exe 85 PID 2892 wrote to memory of 2500 2892 8ca54d050387fe40a057c34107a50a20.exe 85 PID 2892 wrote to memory of 2500 2892 8ca54d050387fe40a057c34107a50a20.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ca54d050387fe40a057c34107a50a20.exe"C:\Users\Admin\AppData\Local\Temp\8ca54d050387fe40a057c34107a50a20.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\windows\ld08.exec:\windows\ld08.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\487656.bat2⤵PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236B
MD561cd9c12cf01c174ef85dc11303b2eac
SHA107ae3e3f18e6fbe198a3e2b28f0d8cb4e224d66a
SHA2567f98a32a8a9f8b2f46c00473576813570f51166db805b71c7c043aa58e792b2d
SHA5126269295505da37a4abf430d17849078b2249f354d163c52efcd8be6358b4a384985d714190b3ad8303ecf9a587ba3803271907487eb27ae0bf5fdf5c4853e9bf
-
Filesize
14KB
MD58ca54d050387fe40a057c34107a50a20
SHA104417c6d66eca7b6807f35bfdaf221d0f4a9de05
SHA25679ea89088b8b3806ca84e19269dea76737a0f9daa5cf52de47b237139042286e
SHA512607bce03389ff3c27ffee05b6e02ffcbfd72b951f43245499c43587f2f85911826597def4eccfd14d81b8820479be38c8ab7596e3b5f5f614a69cc5260bec10f