Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2024, 03:44

General

  • Target

    9aabffd14b0ba5e8c4372c12ad89049b.exe

  • Size

    208KB

  • MD5

    9aabffd14b0ba5e8c4372c12ad89049b

  • SHA1

    d56d36fc436bc1b6cf918c608b6f66438cff2d0d

  • SHA256

    b5fc4eff3cfc4c85901694424d5a1b708f8eb529e199bb41a8040bc7bb53615e

  • SHA512

    3b39ff2938a761ad9bb69bd0eaadf37f10e210d92828b3e74894c3fc1a61dee843be4209a53cfc434f5feb7808d1db159118aa4f60cd1f835ac5e6cfc4a90263

  • SSDEEP

    6144:el0n6au3xPqdryfde/G3oHQwTdnAQMQ3ReiLESupN2+gCS:5n6au3xMWfYu3o3TP3I0H

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9aabffd14b0ba5e8c4372c12ad89049b.exe
    "C:\Users\Admin\AppData\Local\Temp\9aabffd14b0ba5e8c4372c12ad89049b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3716
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\38D3.tmp\vir.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save 9aabffd14b0ba5e8c4372c12ad89049b.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2268
        • C:\Users\Admin\AppData\Local\Temp\3A69.tmp\mpress.exe
          "C:\Users\Admin\AppData\Local\Temp\3A69.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe3A7A.tmp"
          4⤵
          • Executes dropped EXE
          PID:552

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\38D3.tmp\vir.bat

          Filesize

          1KB

          MD5

          5b795cfa8522ba811b59f99b6d878cf8

          SHA1

          0c18c66dbb7da828af8e4a15fa6c77518a2fb514

          SHA256

          7a646597658296d9490fe57dcfdb9d846bacf8f6481f0d4e1de6eb0ed777b0a3

          SHA512

          0d52915e741373fc8c92e720eb971d066a648b7cbb334df8690792967ce260612f78e50db851821d258d28b0f1ac065317ec8c3f3f52b5b44940054cadb883c2

        • C:\Users\Admin\AppData\Local\Temp\3A69.tmp\mpress.exe

          Filesize

          100KB

          MD5

          e42b81b9636152c78ba480c1c47d3c7f

          SHA1

          66a2fca3925428ee91ad9df5b76b90b34d28e0f8

          SHA256

          7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

          SHA512

          4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

        • C:\Users\Admin\AppData\Local\Temp\exe3A7A.tmp

          Filesize

          41KB

          MD5

          7aa367dca7be65e07b16bd69f06263e3

          SHA1

          d447739251408f8e8490a9d307927bfbe41737ce

          SHA256

          738bf50547320b0683af727ad6d430f2e7b83c846fe24f91527b7ee263bfa076

          SHA512

          d7884589d7d12a628c9e07b77b3b793fa91f67fe13563e7b072ca864e053e6b7d711852e30ae1c877576b8ad47f67d2826e8ee711e6b65a329baa57492fe31b3

        • C:\Users\Admin\AppData\Local\Temp\exe3A7A.tmp

          Filesize

          741KB

          MD5

          fede3b152faf828326a1966a63d0ce68

          SHA1

          03673b268f912613e6de2dcebd79efa4cd9b9915

          SHA256

          9945f0e7e578397ab4addf6e01fde79c2983e20c01120477a59d932c6866aefd

          SHA512

          b1f253bb479c81644182ff1854e8bed70616d8824464c2d60b3000791b84afb0fa5be1128d4369cb8540680fcd71bbb4554d8c67336383d0504e8dda6b5487b1

        • C:\Users\Admin\AppData\Local\Temp\mpr3B53.tmp

          Filesize

          207KB

          MD5

          5c8f9a1066119dccaf7e3a3aadb31b34

          SHA1

          a284592f9d878c5ec3b524d4630074b7d72c42f3

          SHA256

          55053a5a17c83669902250dd3d0299dd83bdc2b28460eb0d7c0da2378dd11828

          SHA512

          ac0b13ceeb82ed55cfe20e63149b7bfd70f7b91b3672b37fd10838ffb8b0a6e10d249bea0cb6949d7d3a13827b71e2d52c7ad4ce9ce855365091780391027da0

        • C:\Users\Admin\AppData\Local\Temp\s.dll

          Filesize

          700KB

          MD5

          3c9568b0d86a865f9f73d9c0967cfdad

          SHA1

          3270df3e0e600f4df2c3cbc384837693a8a3a83e

          SHA256

          c7b97a001b39e17382e929aad924555f3d21886b86aed38cffd660490801d1d6

          SHA512

          bd423d1d57823b1bf6db42aeec199aa93178a9317ead85b42b60e091aaf4f73ce721bc07fda4750e112c4dccb9d87e21d5793965da9d6e92b0c5bed92c26876f

        • C:\Users\Admin\AppData\Local\Temp\vir.bat

          Filesize

          1KB

          MD5

          7789cee8b0608f23e8eddc5670494ecd

          SHA1

          98f40598da2a8e4f4299900a4ed4b24aefeb1b3d

          SHA256

          affa1989dc1488bddfa799c895fa98793d3d46b94bf47d9e0d46296999deae0e

          SHA512

          e13f07d2a22eab0262c40464002e02931c97c46efd0152ca3bb88f0314386d7184a97aabe3fdc9d99fc495c1bea5c601eac96313b9e105e26b2d62e22d1027a9

        • memory/552-54-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/552-62-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3716-0-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/3716-1-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/3716-70-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB