Resubmissions

25/02/2024, 17:12

240225-vq9qasgf84 6

25/02/2024, 17:10

240225-vpyawagf65 6

Analysis

  • max time kernel
    69s
  • max time network
    82s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/02/2024, 17:12

General

  • Target

    iron5decompiler.exe

  • Size

    154KB

  • MD5

    2701aef8b0ac8a3e2eaf4f149be596c3

  • SHA1

    2b6f95b404a58a23655f9101b7289a1cefcf164b

  • SHA256

    e02ab02e92eeffa04c08b59e8d0f419a83e880f550abd09e4c98f51eb25556f3

  • SHA512

    537e59b3e3dc87b587c81ed433fef95b3dc52f58584b3fd6fdd86d8b7dd0af5c2ba0fd6dc740c52a71a8e51e4f9441e100aac0d3214be7a1e29d08ba47f0b1e9

  • SSDEEP

    3072:MahKyd2n31z5GWp1icKAArDZz4N9GhbkrNEk1kT:MahObp0yN90QE7

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Delays execution with timeout.exe 5 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\iron5decompiler.exe
    "C:\Users\Admin\AppData\Local\Temp\iron5decompiler.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4936
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c "iron5decompiler.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c findstr /b ::: "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iron5decompiler.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4072
        • C:\Windows\system32\findstr.exe
          findstr /b ::: "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iron5decompiler.bat"
          4⤵
            PID:1384
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c findstr /b ::: "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iron5decompiler.bat"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2688
          • C:\Windows\system32\findstr.exe
            findstr /b ::: "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iron5decompiler.bat"
            4⤵
              PID:4736
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c findstr /b ::: "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iron5decompiler.bat"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2896
            • C:\Windows\system32\findstr.exe
              findstr /b ::: "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iron5decompiler.bat"
              4⤵
                PID:1064
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c findstr /b ::: "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iron5decompiler.bat"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2692
              • C:\Windows\system32\findstr.exe
                findstr /b ::: "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iron5decompiler.bat"
                4⤵
                  PID:2204
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c findstr /b ::: "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iron5decompiler.bat"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2452
                • C:\Windows\system32\findstr.exe
                  findstr /b ::: "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iron5decompiler.bat"
                  4⤵
                    PID:3144
                • C:\Windows\system32\timeout.exe
                  timeout 1
                  3⤵
                  • Delays execution with timeout.exe
                  PID:3544
                • C:\Windows\system32\timeout.exe
                  timeout 1
                  3⤵
                  • Delays execution with timeout.exe
                  PID:3360
                • C:\Windows\system32\timeout.exe
                  timeout 1
                  3⤵
                  • Delays execution with timeout.exe
                  PID:4216
                • C:\Windows\system32\timeout.exe
                  timeout 1
                  3⤵
                  • Delays execution with timeout.exe
                  PID:2044
                • C:\Windows\system32\timeout.exe
                  timeout 1
                  3⤵
                  • Delays execution with timeout.exe
                  PID:1144

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iron5decompiler.bat

              Filesize

              1KB

              MD5

              2df2237a99f9a6581bff130175e775e9

              SHA1

              bbca645ce2870c603ef55f3c05e18b38cfd20b48

              SHA256

              2f4cdf7ae69b523da388f2e8bd2cd9fc8d62d36ad9e1f9bf18b49af83229b8c2

              SHA512

              404fe89854335ca03efd360ed80ad196654723edf6b81af7e0f205dc078449359023027ee47e0e8bad46ccf60b061db4eedfc7083e78f6501c04dc9635c5f115

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\null

              Filesize

              34B

              MD5

              37ea882f356e462d579aa4ccd8e089d6

              SHA1

              2b7a2179237fc17135a8a1e14439e9e272242e37

              SHA256

              d2cf402243a6ed040e5e51fc45c4a72da1e7db60136d54a9c84b0955faf3a4f9

              SHA512

              7856d7edd31ed3ed37add96b0e4377d1dee3a83f3f702093fa2375a3c27b99e5d3f5c980e8de265ab46218d9c48d172c1a9ff6781c0be013d62b1ca117396c99