Overview
overview
7Static
static
7a0e368bf4c...08.exe
windows7-x64
3a0e368bf4c...08.exe
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PROGRAM_F...ll.exe
windows7-x64
7$PROGRAM_F...ll.exe
windows10-2004-x64
7imex.bat
windows7-x64
7imex.bat
windows10-2004-x64
7vpncore.exe
windows7-x64
7vpncore.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 03:57
Behavioral task
behavioral1
Sample
a0e368bf4c4a6c276126224f70d6ad08.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a0e368bf4c4a6c276126224f70d6ad08.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
$PROGRAM_FILES/$0/Uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PROGRAM_FILES/$0/Uninstall.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
imex.bat
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
imex.bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
vpncore.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
vpncore.exe
Resource
win10v2004-20240221-en
General
-
Target
imex.bat
-
Size
91B
-
MD5
ba47c1e6fba35998c875caebad2a11b9
-
SHA1
6c64f06c5f22a2ae9ef6d71bc4a755ac6cb8b0a3
-
SHA256
5eae4f657167314616cf3109d6b4a26de667dc9455b55f640677e1d84535c8d3
-
SHA512
7038353d527d44688f679fd916fc7879610047f1b030fc065f51d44221079cbbd7986f1853cdb53e277f93bbe24b4a4fa452f85e875c3ede8fa37fb400a3421f
Malware Config
Signatures
-
resource yara_rule behavioral10/memory/3628-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral10/memory/3628-1-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2412 wrote to memory of 3628 2412 cmd.exe 87 PID 2412 wrote to memory of 3628 2412 cmd.exe 87 PID 2412 wrote to memory of 3628 2412 cmd.exe 87