Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-02-2024 17:30
Behavioral task
behavioral1
Sample
a9bf1f4e355f768d58a807c63e63a457.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9bf1f4e355f768d58a807c63e63a457.exe
Resource
win10v2004-20240226-en
General
-
Target
a9bf1f4e355f768d58a807c63e63a457.exe
-
Size
28KB
-
MD5
a9bf1f4e355f768d58a807c63e63a457
-
SHA1
805737bb8ad48c336cb3b8d76ffdd3012e4fc959
-
SHA256
7b755a1bb5485ba6372f56287bdaf15a97d55e1fa179a3ea05395c64abb3d922
-
SHA512
c600c719b1ef59a4ba34c47b16c17104fad533fd9af7f0b7f3ec461139ebd55ef7499fd933a211d3523d55cda0ee7f4294d40d979033d236b5a042f3bed79d41
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNLLrT:Dv8IRRdsxq1DjJcqfmz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3956 services.exe -
resource yara_rule behavioral2/memory/4940-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x0007000000023232-3.dat upx behavioral2/memory/3956-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4940-13-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3956-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3956-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3956-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4940-25-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3956-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4940-30-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x000f000000023144-43.dat upx behavioral2/memory/3956-100-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4940-197-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3956-217-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4940-230-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3956-231-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3956-235-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4940-236-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3956-240-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4940-275-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3956-285-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4940-321-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3956-335-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4940-366-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3956-386-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4940-413-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3956-432-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4940-466-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3956-476-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" a9bf1f4e355f768d58a807c63e63a457.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe a9bf1f4e355f768d58a807c63e63a457.exe File opened for modification C:\Windows\java.exe a9bf1f4e355f768d58a807c63e63a457.exe File created C:\Windows\java.exe a9bf1f4e355f768d58a807c63e63a457.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4940 wrote to memory of 3956 4940 a9bf1f4e355f768d58a807c63e63a457.exe 88 PID 4940 wrote to memory of 3956 4940 a9bf1f4e355f768d58a807c63e63a457.exe 88 PID 4940 wrote to memory of 3956 4940 a9bf1f4e355f768d58a807c63e63a457.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9bf1f4e355f768d58a807c63e63a457.exe"C:\Users\Admin\AppData\Local\Temp\a9bf1f4e355f768d58a807c63e63a457.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD55431b34b55fc2e8dfe8e2e977e26e6b5
SHA187cf8feeb854e523871271b6f5634576de3e7c40
SHA2563d7c76daab98368a0dd25cd184db039cdd5d1bc9bd6e9bb91b289119047f5432
SHA5126f309dd924ba012486bcf0e3bafe64899007893ea9863b6f4e5428384ad23d9942c74d17c42a5cf9922a0e0fd8d61c287a2288a945a775586125d53376b9325c
-
Filesize
215KB
MD5185d6180b16a511792651c7f256228d6
SHA15a97534692735f407810d39f6ad5f95b1120e144
SHA25662348348f7689922ca3df15a99b7c13bc597af7c6252b784b9c10fa065a10899
SHA5125e2ae27ae59dd49b8932beb267a19674cf08cc38fef473b7a92195231ccb18af88b584979d5297852bb98c5b94c29f441d0ffe32f28a406497f1f644ca286614
-
Filesize
188KB
MD5aa1e0087c1cc5d0a1c424360ec389d06
SHA11b32aaea9f16ba766943a45b01733119ee0687ab
SHA25697efd81e8d016779934d8ae990b3da765ee090235983b0d988df0cb31749d6ad
SHA512767246b24b72ba1844140fab9d481557d9aa574d81be36752afafeab1ac81c49a7b5b4859d18a56de16fed15e863287fd8b998ee519c4af8c90916fd2997d2b6
-
Filesize
226KB
MD5d3c45e8f3054ad74a17667179f7c82ae
SHA181147ab96788bf9397a9c32a90ae417e5f2775bd
SHA2560fa5f923990518834b1063d1561dc57d9cad06ae184ecd482ec412f561570ea1
SHA51217f954529bbe95ee520913bdc5f54ab8d7214a1e50aae9d5354b66dff26b0dbe2330991fe17d075ed022693b8fd58d9edce15ec06ebc6119225469b918c6b483
-
Filesize
308B
MD55243568476eb2052b2f3b67dc9053e86
SHA1b126aa6506772f9024b76580bdf28b45e3a7f051
SHA2562d458622dc76eb87e44cc7db89309efdf50f99821145ae86864fd1b714cbaa80
SHA5123c68cef4e3daa4bca6e8b3aa5a31874be1e4dec38fe9781c6fe4890980744527d0c6818eeb519f8e6b322118e1f08302d85972fa7da4ba8be9421aabf9a77833
-
Filesize
203KB
MD5831fae952001c646ccfefd2e3d2f4d7a
SHA157655e31c8722885ad5ce3aa8203f94fb2d74bf5
SHA256d81640143f7155bced76a4be3dc28f7e4032dd020b7369900d7a2f79a132e888
SHA512f8a96ef926737de58b6303b2c4d44cd95939346e56b15367d400d27e74425f0947b701a6642ea11938e18c66cfcc49c06a7fd42ca0d11eb46c7b2ab30b647a41
-
Filesize
147KB
MD51c42917530688e8f63de222881dcdd91
SHA13bcf0dbb4b0e9077c3ee9688407e01e0842318c9
SHA256f253a11f2e174d7fe3341c77711b1ddf9eb840f4dafe470bd40e2f4fe985b16a
SHA51294f3b23e09d61c13d9cb7a981793be7bed2ab2caae4926f5d7579c4be6877562620e24c83f87d79f6eb28dcf0e19ca41c630d56f126b48bae194c7646b7846b8
-
Filesize
310B
MD52a8026547dafd0504845f41881ed3ab4
SHA1bedb776ce5eb9d61e602562a926d0fe182d499db
SHA256231fe7c979332b82ceccc3b3c0c2446bc2c3cab5c46fb7687c4bb579a8bba7ce
SHA5121f6fa43fc0cf5cbdb22649a156f36914b2479a93d220bf0e23a32c086da46dd37e8f3a789e7a405abef0782e7b3151087d253c63c6cefcad10fd47c699fbcf97
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
147KB
MD51bacfe4cc2ff3e96b972cec241daefb7
SHA1341852604c7ff41e3a96f8dc228bfcae7db7381b
SHA25604c13d0614d4f99aeb80380f79a9ee84c9ad4afe7d3d48249bf4e60fdab47f9e
SHA5121eb42291ea1c7cca1fb9f389dc5968da969b8379cd079d586cca90b7d1cb08431561add0e529343dbec64640662f700a2882ef53fbb387584de9ecdf783008d9
-
Filesize
312B
MD5c15952329e9cd008b41f979b6c76b9a2
SHA153c58cc742b5a0273df8d01ba2779a979c1ff967
SHA2565d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA5126aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296
-
Filesize
311B
MD5cb42662caffe525e9957c942617edf06
SHA1615009db9a1a242579e639ee0fc7a2a765095bfe
SHA256312bf5c9a1a122abc6361bf8ed01a44346285b962c0d273ef2de0eb796ae1b15
SHA5123e6777f1f74f64fff6cb2bd1a81a6c08d9a64feeebc3deb7cacb8f0f41b23a5c59a8e6294b99c76dd386aaaf9043a1a252ac47910fe1801bdc2995f7b675692c
-
Filesize
313B
MD5ffb72ab4faba49ad441ce07db37dd8b6
SHA1194e13c1c32ebb6e7a1dc912261cbd58a82ff71e
SHA2567bd7c3676e98ddde8e0d5b63dd22cb9379d975bcd1d68884c97565cdd8d03660
SHA512517be20d2442489ce39b48dc7f9f6f13f8c45d02703fb1865071f553d36b2289f5abc26c6089fc0bfad1a41fe318bf4b5a806915c5e45898ac744b7e4ed30257
-
Filesize
1KB
MD54ec22feef92fc9118f6840ea8cef4521
SHA18fafcbb4d6c7111c048bb3dea44556d73e623802
SHA25638a807425e7ceebce84f57b1eff193a9557234c629d13c11e4a51891de206007
SHA5120d3d50afa8023ad6e396e0a232cee3ffc2618237bffe19bbba2ac4e8b5f76db1d99f8dd1c3a9712891fc8927e42bd316343c53e9da7460efa31d8b79e47f1069
-
Filesize
28KB
MD55444a53ed840324018849eaddb2a235b
SHA1452e8daf8dec15dc1644e9b961ec126028223b37
SHA2563160be74b17a9e2aad78ad6a9055dfcf2afce9aeac3939fb868071c1740a4807
SHA512f098f0dc9216436680c41bb49b7ef173ebeaf9a0101fb3c966dbc0c046f203b6a4b76b5e8e3e0cf254fbd26b3734b48f0500243f48c4c285ab97eb0feb18cb88
-
Filesize
1KB
MD5e493ff2b28145038309c3685e3194d1f
SHA1ee1cb6a5ca80c671c846db4811fc52d1374e77a7
SHA256dc1262bc4d01a8b36c4f64b2b9761dade9ab8bde12083790052e09f0e6619962
SHA512d77db8d160c095b014709264d093c4eace276a3c5a8e1e27778c6586ef4682e25b240d2ec0fe9c11d172759728e43d01bf6da5ecf349b02dde927d020b57e6be
-
Filesize
1KB
MD5aaa1459ca9a0bb275e49aded80477e2a
SHA1905ac35545a2746da7537830659bd47e65c0b4ef
SHA256052167083b1c420c33c397756cd1222ea16c7d75348a0b90fbf8a4071dd5e171
SHA512fefedbd7bb3954a0653d1ecb2fbe71a4ef87d44081ca2169152617942c7e7f47f24a500a0a8348c23d96a07159010e1f6c445fafdd541b2824fdc95a23897801
-
Filesize
1KB
MD5384fc92ba423d06516cfef884bff3e73
SHA1b30735dcbd6b2c2801431c56c9cce248cc50d915
SHA2560d6ea7ae1e00390984fc7aed399f623dd9b60df43beb61168cc957adbdd1a3cb
SHA512926efc7b9c2429887a0308b02e1ef2837f6cd111a1dd1d46fef8bd2abd757e10ce6c4883af92bf4ea336e1f7cc5d5cb9139a5448b111777b58d45536681e616f
-
Filesize
1KB
MD5664b69b1913a385eb2b39d478be95670
SHA19799ef0bbf4c579cc7add8fa3052b35f6c654649
SHA256098a995c08db7ac43400b096f43a9a5f726f98b2aac09a860074c4e2f40733c6
SHA512af72e5185d04edc119d493c4f79c6f7c83baa0f6ac2a27f1381e2cd9743c64cb8ebdfe11dd256f5c8334589fc59746b5448e62e6233517e6057f761730de47fb
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2