Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 08:37
Behavioral task
behavioral1
Sample
a3580c1e63fb79c7587a315fdce70955.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3580c1e63fb79c7587a315fdce70955.exe
Resource
win10v2004-20240221-en
General
-
Target
a3580c1e63fb79c7587a315fdce70955.exe
-
Size
174KB
-
MD5
a3580c1e63fb79c7587a315fdce70955
-
SHA1
bc1d8412bb6e5d2bc20bee65096835018ed48783
-
SHA256
0472d7d06662426a7e6442a8e587062fb3743315faaaa06d91c147fa46657ec2
-
SHA512
64d0711883c92b4d3f2ecbd3092ce16bc0a9971219f889a29c5a80f4622569507bdba5a24f742e32d2d5b230f9b55cfb79adfe634adc8c14305beedfd5afb7b5
-
SSDEEP
3072:cMmqRE8sJyJ59y1zEXPAF2tzdsXqakGS8r9iDN47efl2szay5o9tfYy:sJuK1IPAMdsXlku9iB47u2ia/r
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x00380000000139c9-7.dat aspack_v212_v242 -
Loads dropped DLL 1 IoCs
pid Process 2912 a3580c1e63fb79c7587a315fdce70955.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\api32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\apiqq.exe" a3580c1e63fb79c7587a315fdce70955.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 2912 a3580c1e63fb79c7587a315fdce70955.exe 2912 a3580c1e63fb79c7587a315fdce70955.exe 2912 a3580c1e63fb79c7587a315fdce70955.exe 2912 a3580c1e63fb79c7587a315fdce70955.exe 2912 a3580c1e63fb79c7587a315fdce70955.exe 2912 a3580c1e63fb79c7587a315fdce70955.exe 2912 a3580c1e63fb79c7587a315fdce70955.exe 2912 a3580c1e63fb79c7587a315fdce70955.exe 2912 a3580c1e63fb79c7587a315fdce70955.exe 2912 a3580c1e63fb79c7587a315fdce70955.exe 2912 a3580c1e63fb79c7587a315fdce70955.exe 2912 a3580c1e63fb79c7587a315fdce70955.exe 2912 a3580c1e63fb79c7587a315fdce70955.exe 2912 a3580c1e63fb79c7587a315fdce70955.exe 2912 a3580c1e63fb79c7587a315fdce70955.exe 2912 a3580c1e63fb79c7587a315fdce70955.exe 2912 a3580c1e63fb79c7587a315fdce70955.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 2912 wrote to memory of 1232 2912 a3580c1e63fb79c7587a315fdce70955.exe 11
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\a3580c1e63fb79c7587a315fdce70955.exe"C:\Users\Admin\AppData\Local\Temp\a3580c1e63fb79c7587a315fdce70955.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110KB
MD505efac057d81673c40025d79b524b3cb
SHA19c2800e2f116ae0d2769987d0064bd1810601000
SHA2560d6cef04df3b24c4c06fe8971ae3221051345c1272fdfd37c82783032c517902
SHA512536e8e373517f49e8faed3821eef7b2a1dca22343d326c77ba337f6d25c201200f0db9c14a5b5198fa5da901a86b0cca3309c594a102514c79bac2cba31d5417