Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
95b9b51cfe0796540645738824c7ba37.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
95b9b51cfe0796540645738824c7ba37.exe
Resource
win10v2004-20231222-en
General
-
Target
95b9b51cfe0796540645738824c7ba37.exe
-
Size
212KB
-
MD5
95b9b51cfe0796540645738824c7ba37
-
SHA1
25bea9b86cda5fa6c298f4b4f5c47417558317be
-
SHA256
89ab3f300162c3ea2cd0b5fe9d829b30d89eef34476b4379960a8283c018c21b
-
SHA512
c00eb3ba24345d30f29dc9ca6d1c2c44f4df7dac0fe890fc50de77db6e19c66f9bfc8ae56a696d66222770f6fcb5382cbeba434833b89133de771122d17cf009
-
SSDEEP
6144:ElcpdZcrWUdMDVWjuIVESYac33G76/ErvlyX0z:HjOdMDLIVCae2u/ELl1
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1644 u.dll 2724 u.dll 2312 mpress.exe -
Loads dropped DLL 6 IoCs
pid Process 1768 cmd.exe 1768 cmd.exe 1768 cmd.exe 1768 cmd.exe 2724 u.dll 2724 u.dll -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1768 2220 95b9b51cfe0796540645738824c7ba37.exe 29 PID 2220 wrote to memory of 1768 2220 95b9b51cfe0796540645738824c7ba37.exe 29 PID 2220 wrote to memory of 1768 2220 95b9b51cfe0796540645738824c7ba37.exe 29 PID 2220 wrote to memory of 1768 2220 95b9b51cfe0796540645738824c7ba37.exe 29 PID 1768 wrote to memory of 1644 1768 cmd.exe 30 PID 1768 wrote to memory of 1644 1768 cmd.exe 30 PID 1768 wrote to memory of 1644 1768 cmd.exe 30 PID 1768 wrote to memory of 1644 1768 cmd.exe 30 PID 1768 wrote to memory of 2724 1768 cmd.exe 31 PID 1768 wrote to memory of 2724 1768 cmd.exe 31 PID 1768 wrote to memory of 2724 1768 cmd.exe 31 PID 1768 wrote to memory of 2724 1768 cmd.exe 31 PID 2724 wrote to memory of 2312 2724 u.dll 32 PID 2724 wrote to memory of 2312 2724 u.dll 32 PID 2724 wrote to memory of 2312 2724 u.dll 32 PID 2724 wrote to memory of 2312 2724 u.dll 32 PID 1768 wrote to memory of 1576 1768 cmd.exe 33 PID 1768 wrote to memory of 1576 1768 cmd.exe 33 PID 1768 wrote to memory of 1576 1768 cmd.exe 33 PID 1768 wrote to memory of 1576 1768 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\95b9b51cfe0796540645738824c7ba37.exe"C:\Users\Admin\AppData\Local\Temp\95b9b51cfe0796540645738824c7ba37.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1B7C.tmp\vir.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 95b9b51cfe0796540645738824c7ba37.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\3765.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\3765.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe3766.tmp"4⤵
- Executes dropped EXE
PID:2312
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵PID:1576
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c61a339c6b870784e035e78ecc60fa79
SHA124e14691b1121fc8b3773fa6f37361815abde0a2
SHA256434eea4a97349ed6fe82dd02594e86b3713b48b8791cbed4202375bd1a89a688
SHA5127841e6f0185f15f2c870e0c5f9cdf7ba65c27c93e3100a0c7db090a9090d3ad96668d659c9fa516ec249b009aa40e0a6b9bc6cf02be9119c072f9ec3ca97f113
-
Filesize
41KB
MD532604a5eed1e29f05e32b1c84f070240
SHA13f494c93260a37b2f3addb820c6a39b9d5850f87
SHA2569cdd4c8322c5d7bfe73cb767b4c716151f9116488736bd455092e8060216fce0
SHA512b3dbbf9a5602f259b9e9b438233e41e051330d2748423a3b0f1f65541e80777bbfd95b44c5576cc23c1940cba6ed38b3fbdc3e662518ce8bc63aaac522a70131
-
Filesize
25KB
MD530b93300f8cf8459d771a21c45cae7f3
SHA1fbdd696afde6f5b99cd7eebc9210d08d93744250
SHA2569696cfdbde562901d706815ab13bac0c3adce123ab5583597f9f22ecaa534043
SHA51283f5866194485beea1e4c38aa14a5ce945f6bdaaeda395ca5256f81e53586aa190415c606322a6244a3b887c02eb72d5b1454e3ece9771a5f0549dafb2e29c60
-
Filesize
42KB
MD5b90ddebed9c67a7a3339225649a74609
SHA132be0513b600f53ed274271c49d3b0d6c87ab593
SHA2564ffa1779b01c50f0d3d0238234f67f4a6f84cc3fb5e02cc7de52bc3a3878b277
SHA512c4b325de3f5fc0123b7bb62aa5ae4224a4de37ead560686ded1e40db2b6baa7c55c06b125ee5e33f74396944493ad9945a41f322af6ab2d233cc6f8121b5be87
-
Filesize
700KB
MD5b7e0c62e9ae4f3b408da602cc27c0d3b
SHA1e313c16659880528b3c72b5ca36699898f5a8587
SHA256566f0eeb5de3b198b1365a0aa58e72711fd74645403c92d3e78683d7608013a4
SHA5127a901eba9dfe8dc9c8d6670b1791079bb2fe33ba86f4b3481e08378def2100c87537232d6e3aabd6594975f9dfd658ae23fab2071a21b62d950541e9a9546dbe
-
Filesize
1KB
MD5225158ce5eec20a3c8068cf388730485
SHA12e4030f8a20d672a33eafee8fb3ad8ce0ebfdbdd
SHA256a7a07dd7553ed7e10bb9c90463b9ef29e28dbeddff450ff97af10eb51a9d16a5
SHA51235e000b0a0d8852e46d0d5f0967a4f900f7030469bff8d999a39bfed3236015a04d1160b8dfc0fa3bede66b1276b276acf9236d1a2d663b89beed73d587fba05
-
Filesize
1KB
MD5a9949e567fc9de0cb29453e85f091665
SHA1caadf233e2cd73cfa1e3b642c618eea011ac4787
SHA2560689fdfa1d234a318af5d32774676b736e4fdaaefd0140372ff617712e657529
SHA51247863656298517e2fbc06edfdce759dea785c3f36654e2ed10236d865e54a40e87b4190752372d9271eca2f6ed56eda13ecf08cc1e5d9ad9ab1e66908c5ecfbe
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e