Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
9aabffd14b0ba5e8c4372c12ad89049b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9aabffd14b0ba5e8c4372c12ad89049b.exe
Resource
win10v2004-20231222-en
General
-
Target
9aabffd14b0ba5e8c4372c12ad89049b.exe
-
Size
208KB
-
MD5
9aabffd14b0ba5e8c4372c12ad89049b
-
SHA1
d56d36fc436bc1b6cf918c608b6f66438cff2d0d
-
SHA256
b5fc4eff3cfc4c85901694424d5a1b708f8eb529e199bb41a8040bc7bb53615e
-
SHA512
3b39ff2938a761ad9bb69bd0eaadf37f10e210d92828b3e74894c3fc1a61dee843be4209a53cfc434f5feb7808d1db159118aa4f60cd1f835ac5e6cfc4a90263
-
SSDEEP
6144:el0n6au3xPqdryfde/G3oHQwTdnAQMQ3ReiLESupN2+gCS:5n6au3xMWfYu3o3TP3I0H
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2268 u.dll 552 mpress.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3716 wrote to memory of 2212 3716 9aabffd14b0ba5e8c4372c12ad89049b.exe 87 PID 3716 wrote to memory of 2212 3716 9aabffd14b0ba5e8c4372c12ad89049b.exe 87 PID 3716 wrote to memory of 2212 3716 9aabffd14b0ba5e8c4372c12ad89049b.exe 87 PID 2212 wrote to memory of 2268 2212 cmd.exe 88 PID 2212 wrote to memory of 2268 2212 cmd.exe 88 PID 2212 wrote to memory of 2268 2212 cmd.exe 88 PID 2268 wrote to memory of 552 2268 u.dll 89 PID 2268 wrote to memory of 552 2268 u.dll 89 PID 2268 wrote to memory of 552 2268 u.dll 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aabffd14b0ba5e8c4372c12ad89049b.exe"C:\Users\Admin\AppData\Local\Temp\9aabffd14b0ba5e8c4372c12ad89049b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\38D3.tmp\vir.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 9aabffd14b0ba5e8c4372c12ad89049b.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\3A69.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\3A69.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe3A7A.tmp"4⤵
- Executes dropped EXE
PID:552
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55b795cfa8522ba811b59f99b6d878cf8
SHA10c18c66dbb7da828af8e4a15fa6c77518a2fb514
SHA2567a646597658296d9490fe57dcfdb9d846bacf8f6481f0d4e1de6eb0ed777b0a3
SHA5120d52915e741373fc8c92e720eb971d066a648b7cbb334df8690792967ce260612f78e50db851821d258d28b0f1ac065317ec8c3f3f52b5b44940054cadb883c2
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
41KB
MD57aa367dca7be65e07b16bd69f06263e3
SHA1d447739251408f8e8490a9d307927bfbe41737ce
SHA256738bf50547320b0683af727ad6d430f2e7b83c846fe24f91527b7ee263bfa076
SHA512d7884589d7d12a628c9e07b77b3b793fa91f67fe13563e7b072ca864e053e6b7d711852e30ae1c877576b8ad47f67d2826e8ee711e6b65a329baa57492fe31b3
-
Filesize
741KB
MD5fede3b152faf828326a1966a63d0ce68
SHA103673b268f912613e6de2dcebd79efa4cd9b9915
SHA2569945f0e7e578397ab4addf6e01fde79c2983e20c01120477a59d932c6866aefd
SHA512b1f253bb479c81644182ff1854e8bed70616d8824464c2d60b3000791b84afb0fa5be1128d4369cb8540680fcd71bbb4554d8c67336383d0504e8dda6b5487b1
-
Filesize
207KB
MD55c8f9a1066119dccaf7e3a3aadb31b34
SHA1a284592f9d878c5ec3b524d4630074b7d72c42f3
SHA25655053a5a17c83669902250dd3d0299dd83bdc2b28460eb0d7c0da2378dd11828
SHA512ac0b13ceeb82ed55cfe20e63149b7bfd70f7b91b3672b37fd10838ffb8b0a6e10d249bea0cb6949d7d3a13827b71e2d52c7ad4ce9ce855365091780391027da0
-
Filesize
700KB
MD53c9568b0d86a865f9f73d9c0967cfdad
SHA13270df3e0e600f4df2c3cbc384837693a8a3a83e
SHA256c7b97a001b39e17382e929aad924555f3d21886b86aed38cffd660490801d1d6
SHA512bd423d1d57823b1bf6db42aeec199aa93178a9317ead85b42b60e091aaf4f73ce721bc07fda4750e112c4dccb9d87e21d5793965da9d6e92b0c5bed92c26876f
-
Filesize
1KB
MD57789cee8b0608f23e8eddc5670494ecd
SHA198f40598da2a8e4f4299900a4ed4b24aefeb1b3d
SHA256affa1989dc1488bddfa799c895fa98793d3d46b94bf47d9e0d46296999deae0e
SHA512e13f07d2a22eab0262c40464002e02931c97c46efd0152ca3bb88f0314386d7184a97aabe3fdc9d99fc495c1bea5c601eac96313b9e105e26b2d62e22d1027a9