Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
98e58a223371323e1c0ac5f632a2393d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98e58a223371323e1c0ac5f632a2393d.exe
Resource
win10v2004-20231215-en
General
-
Target
98e58a223371323e1c0ac5f632a2393d.exe
-
Size
209KB
-
MD5
98e58a223371323e1c0ac5f632a2393d
-
SHA1
2f387fc20697178cd5718557378d04c2565876dd
-
SHA256
9d313f2d3a69082875c128c9000ff213b7dcaf83c9bf0b352194b222baeacb6b
-
SHA512
176bf5bacd4d0d5496635676fcebfed421e68d306a9c50b5f9d7a3c187170bc592953548a54084ed31ad999135c9c8ae0f141675fa2d70bad06e53c315659b59
-
SSDEEP
3072:Tl/Oe4vhx1lX176mdohytUqjz+Mww7FXsQExxQMuQULl2WjfROVoUber8vwQbOeX:TlH4JfRd7yaUeqQ+ePdLU1eCwQB5hN
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2336 u.dll 2832 mpress.exe 312 u.dll -
Loads dropped DLL 6 IoCs
pid Process 2824 cmd.exe 2824 cmd.exe 2336 u.dll 2336 u.dll 2824 cmd.exe 2824 cmd.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2824 2056 98e58a223371323e1c0ac5f632a2393d.exe 29 PID 2056 wrote to memory of 2824 2056 98e58a223371323e1c0ac5f632a2393d.exe 29 PID 2056 wrote to memory of 2824 2056 98e58a223371323e1c0ac5f632a2393d.exe 29 PID 2056 wrote to memory of 2824 2056 98e58a223371323e1c0ac5f632a2393d.exe 29 PID 2824 wrote to memory of 2336 2824 cmd.exe 30 PID 2824 wrote to memory of 2336 2824 cmd.exe 30 PID 2824 wrote to memory of 2336 2824 cmd.exe 30 PID 2824 wrote to memory of 2336 2824 cmd.exe 30 PID 2336 wrote to memory of 2832 2336 u.dll 31 PID 2336 wrote to memory of 2832 2336 u.dll 31 PID 2336 wrote to memory of 2832 2336 u.dll 31 PID 2336 wrote to memory of 2832 2336 u.dll 31 PID 2824 wrote to memory of 312 2824 cmd.exe 32 PID 2824 wrote to memory of 312 2824 cmd.exe 32 PID 2824 wrote to memory of 312 2824 cmd.exe 32 PID 2824 wrote to memory of 312 2824 cmd.exe 32 PID 2824 wrote to memory of 2388 2824 cmd.exe 33 PID 2824 wrote to memory of 2388 2824 cmd.exe 33 PID 2824 wrote to memory of 2388 2824 cmd.exe 33 PID 2824 wrote to memory of 2388 2824 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\98e58a223371323e1c0ac5f632a2393d.exe"C:\Users\Admin\AppData\Local\Temp\98e58a223371323e1c0ac5f632a2393d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\4AB6.tmp\vir.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 98e58a223371323e1c0ac5f632a2393d.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\4CD8.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\4CD8.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe4CD9.tmp"4⤵
- Executes dropped EXE
PID:2832
-
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
PID:312
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵PID:2388
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a3421d9efba58e2b7d5a6ef5cd02b514
SHA1fa5fa9a311563d71676ec70673f7d8e659a9907a
SHA256d682685de05f2574348bcd07f4ee43039c821813307adca6b861af7c5403b65a
SHA51217984de0658c69544a572b0046f6a729381a45c9fa2f72f2f866239753bb6a384355100176cb8a7b1a896f48048da03db3bf537cf332bd460bed6f3834239d6c
-
Filesize
43KB
MD5d0ae8ca54890d52697b4d58a4c18cc5d
SHA17eb22f1bdc4410c95b0096bf997da72daba21637
SHA25654572b7ccbc2d2a9e640c5140bf0a5d43649b4c8cc8531c503d20f81ef9d0862
SHA512fa3ec5d3a901719a02600e01f4ca4faa168c991260c71f1d6697ecc36b76a0ad10eb207581c3c198bc2f58613fcfeaafe561e77adc80f934e00bffa40ef2da4f
-
Filesize
25KB
MD5db8d020f7e2eed3ea5e5cc05df028ae0
SHA103ce05995f2bda5f042f5a6b53321b80630b15d0
SHA256f4f7f65023d33028d97aedbd5dd1a470c640e0312de96d9b14837ee36c013658
SHA512d6a37bdde114d778551014016cb9e40148ba9fa456e4684450e68c3cb07fc895a5ffd7e934004b08a9092eba60a59153b52fcb8ca38f85a20111b0ab63bca63b
-
Filesize
41KB
MD55a16fb75977e1799ed52f35a164922e6
SHA1c1697c61c42498f0501a886392ddd2560646b24c
SHA256f625375b30e87216e720919833d9d4e7bc11f0b61a9d2d218817d2ebb140d7de
SHA5121e31f17c0fea7df5bd321ff0015b8226a378b649c43df1111d9467b0f86f3a14e5a7ae9ed00314695f688b7cc0c18e44b3fa6521a8fea5943e4eb9a69a612216
-
Filesize
700KB
MD5863c312b1e74b57dc2d01a1370684ff3
SHA139175536b2783f4b3d70cb29d3352388cfebbcac
SHA25633c2b1a19a8b31cd969ee88acebba54c9af73d4a8633becfa609e067909db33a
SHA512d6dcd4968bd18b3483f7fb6a63b9640d8d3f3fc63bccd5c0ba294c1f09fc9b6bcb4fae815682d5800f7acf34fdadd2ec54be7d728d754a46b9cdb2362b3fa76d
-
Filesize
1KB
MD543c4ffdec302a298d32b478c782c9859
SHA11d4b82e4a273162b1c3cb6d9ab1c2c930bc5f61a
SHA25653ebb82d3445426bb97559b09ee1054fbffaea98615319b9a3b74789a4c71fca
SHA5126539fd532c637aef0c80f81b0dc4fd91f1835053628d14a5a3b3f29b500e58bf2f9b8ec7b14b9f5d72e19bbd64d4cc960c8e15bb55b3720ca1e3940582ab201e
-
Filesize
1KB
MD5608c0dc08d53756d813b2793dd43c409
SHA1210b7d7f65af60272861c53cab38afbb201d2c47
SHA256c1e14517184282f404f360e22fc7cafc29575ebb629130f003715b397858b09a
SHA512bfbfbc542cacaac30770cd59ca1c35e6051026e6377532b698372ac9920fd9dc38fe0e1f5b0d61658c7d631487f3a36e8c1abf0aa14130a3b5b1de657f25baca
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e