Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 08:38
Behavioral task
behavioral1
Sample
a3581433f0ff4f948ddcccbe141f02be.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3581433f0ff4f948ddcccbe141f02be.exe
Resource
win10v2004-20240221-en
General
-
Target
a3581433f0ff4f948ddcccbe141f02be.exe
-
Size
10KB
-
MD5
a3581433f0ff4f948ddcccbe141f02be
-
SHA1
fa93ee06763d10a81cd1d768f76d31bd8ed7a866
-
SHA256
e958b8c7e11b58dcdb3af8deafa15e6d041e6da5fd0e5a171c718a72593c9158
-
SHA512
1cbafb20f5885d6523ed0c24cce931161d6affab3e9ab00ce155bc7d061522eac25fc4564bbd3972253dfb950e98ebbb4991c70b53f540c0b865d36dbc5c3dc3
-
SSDEEP
192:gIysA/4ZJDPuuxDQNQ2spwlqZif/R/J9a+GGzDxlJAiYFhyArDg+:gIysAwZJWNNvVqZkRjNDDxlKiYFgArs+
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2560 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 mpacklk.exe -
Loads dropped DLL 2 IoCs
pid Process 2224 a3581433f0ff4f948ddcccbe141f02be.exe 2224 a3581433f0ff4f948ddcccbe141f02be.exe -
resource yara_rule behavioral1/memory/2224-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x00040000000130fc-3.dat upx behavioral1/memory/2224-4-0x00000000001B0000-0x00000000001BF000-memory.dmp upx behavioral1/memory/2224-11-0x00000000001B0000-0x00000000001BF000-memory.dmp upx behavioral1/memory/2744-12-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2224-20-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\mpacklk.exe a3581433f0ff4f948ddcccbe141f02be.exe File opened for modification C:\Windows\SysWOW64\mpacklk.exe a3581433f0ff4f948ddcccbe141f02be.exe File created C:\Windows\SysWOW64\mpackl.dll a3581433f0ff4f948ddcccbe141f02be.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2224 a3581433f0ff4f948ddcccbe141f02be.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2744 2224 a3581433f0ff4f948ddcccbe141f02be.exe 28 PID 2224 wrote to memory of 2744 2224 a3581433f0ff4f948ddcccbe141f02be.exe 28 PID 2224 wrote to memory of 2744 2224 a3581433f0ff4f948ddcccbe141f02be.exe 28 PID 2224 wrote to memory of 2744 2224 a3581433f0ff4f948ddcccbe141f02be.exe 28 PID 2224 wrote to memory of 2560 2224 a3581433f0ff4f948ddcccbe141f02be.exe 29 PID 2224 wrote to memory of 2560 2224 a3581433f0ff4f948ddcccbe141f02be.exe 29 PID 2224 wrote to memory of 2560 2224 a3581433f0ff4f948ddcccbe141f02be.exe 29 PID 2224 wrote to memory of 2560 2224 a3581433f0ff4f948ddcccbe141f02be.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3581433f0ff4f948ddcccbe141f02be.exe"C:\Users\Admin\AppData\Local\Temp\a3581433f0ff4f948ddcccbe141f02be.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\mpacklk.exeC:\Windows\system32\mpacklk.exe ˜‰2⤵
- Executes dropped EXE
PID:2744
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\a3581433f0ff4f948ddcccbe141f02be.exe.bat2⤵
- Deletes itself
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD554d2fc85b7281673f229309f332dbb1a
SHA120f6bb3c50d31522fee82ce85ca3b7b609322d73
SHA256166a97f077deb419566d7c416622df81a4abf3a5f73d00f66d340c5ca75c78c6
SHA512e1edac5cd5ad39c9ca20141f74ef76c5898d8a509854171a70282e5753d5e5e0df7601071c7cbe592b4e64140b31be8438e4174dfa95d02e274b00f0cafaa332
-
Filesize
10KB
MD5a3581433f0ff4f948ddcccbe141f02be
SHA1fa93ee06763d10a81cd1d768f76d31bd8ed7a866
SHA256e958b8c7e11b58dcdb3af8deafa15e6d041e6da5fd0e5a171c718a72593c9158
SHA5121cbafb20f5885d6523ed0c24cce931161d6affab3e9ab00ce155bc7d061522eac25fc4564bbd3972253dfb950e98ebbb4991c70b53f540c0b865d36dbc5c3dc3