Analysis
-
max time kernel
130s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 06:57
Behavioral task
behavioral1
Sample
8e81c5b134659bff81679e84edf4cb25.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e81c5b134659bff81679e84edf4cb25.exe
Resource
win10v2004-20231222-en
General
-
Target
8e81c5b134659bff81679e84edf4cb25.exe
-
Size
14KB
-
MD5
8e81c5b134659bff81679e84edf4cb25
-
SHA1
5a245cc1c446cfc2fe4a8df4cd483a79e912e0ef
-
SHA256
88b25267ac7663036ed496320a0d57c07440b1ac4510c6591cd1449d0b4afd99
-
SHA512
80521bf366d9016c4786596e8a19a8b9fa65047d05dd1195d4548408d33ff4f846db68d14b66261e3092f3b7deb95213c1925506cd77bd2457264aea319834db
-
SSDEEP
384:8PEFCpcGo9nAH+yCAJti30/yGHxXUPk3DqSG0J:sZcR9AHBCEtiEaGHxkPADqP
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 5632 wllamek.exe -
resource yara_rule behavioral2/memory/3812-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x000600000002322d-4.dat upx behavioral2/memory/5632-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/5632-8-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/3812-7-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\wllame.dll 8e81c5b134659bff81679e84edf4cb25.exe File created C:\Windows\SysWOW64\wllamek.exe 8e81c5b134659bff81679e84edf4cb25.exe File opened for modification C:\Windows\SysWOW64\wllamek.exe 8e81c5b134659bff81679e84edf4cb25.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3812 wrote to memory of 5632 3812 8e81c5b134659bff81679e84edf4cb25.exe 87 PID 3812 wrote to memory of 5632 3812 8e81c5b134659bff81679e84edf4cb25.exe 87 PID 3812 wrote to memory of 5632 3812 8e81c5b134659bff81679e84edf4cb25.exe 87 PID 3812 wrote to memory of 2668 3812 8e81c5b134659bff81679e84edf4cb25.exe 98 PID 3812 wrote to memory of 2668 3812 8e81c5b134659bff81679e84edf4cb25.exe 98 PID 3812 wrote to memory of 2668 3812 8e81c5b134659bff81679e84edf4cb25.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e81c5b134659bff81679e84edf4cb25.exe"C:\Users\Admin\AppData\Local\Temp\8e81c5b134659bff81679e84edf4cb25.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\wllamek.exeC:\Windows\system32\wllamek.exe ˜‰2⤵
- Executes dropped EXE
PID:5632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\8e81c5b134659bff81679e84edf4cb25.exe.bat2⤵PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5d5cc43c1bd98320526e4432ebf30aa5b
SHA1eb040d4756e48e573586addfeae32c76df1ec262
SHA25675a8652a59b920c07104ad3358a845389d19b4af5da9cc307e09bbe84c63b963
SHA5125c0b5924802b5e144fcd0f4e1218054da79272dcf677c8732e070fac66b7059c193ce116c16596115b681b79fe11f48bcf9edf91c0ddbf91b1960a207d69fb64
-
Filesize
14KB
MD58e81c5b134659bff81679e84edf4cb25
SHA15a245cc1c446cfc2fe4a8df4cd483a79e912e0ef
SHA25688b25267ac7663036ed496320a0d57c07440b1ac4510c6591cd1449d0b4afd99
SHA51280521bf366d9016c4786596e8a19a8b9fa65047d05dd1195d4548408d33ff4f846db68d14b66261e3092f3b7deb95213c1925506cd77bd2457264aea319834db