Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 03:16
Behavioral task
behavioral1
Sample
ad8cbf56dbb0c1dd0a519c630360e174.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad8cbf56dbb0c1dd0a519c630360e174.exe
Resource
win10v2004-20240226-en
General
-
Target
ad8cbf56dbb0c1dd0a519c630360e174.exe
-
Size
12KB
-
MD5
ad8cbf56dbb0c1dd0a519c630360e174
-
SHA1
7bb9b372e65c6805bb1eebcfd84c007edec1fdfd
-
SHA256
0b6edaa6e020408d10809ec220f5ce97a307b760573391f1cd27586bfa37f999
-
SHA512
8f6b83a4f9df383eee278301986deffdb42aeb8cc81f94fbb37527ee4e39593b71ed5bc24f2c9c319d321cf437ececf16092cb9244b0a45077cf1738fb987f30
-
SSDEEP
192:pGRrrkqrlfyag02iAqSR93EBShEQJSv/IQGyjHLunS91R98mm7SVUD+:pGRHjqa92iAqSz0BXQ0IWHLdb98Ruk+
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2556 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2208 docyanxk.exe -
Loads dropped DLL 2 IoCs
pid Process 2744 ad8cbf56dbb0c1dd0a519c630360e174.exe 2744 ad8cbf56dbb0c1dd0a519c630360e174.exe -
resource yara_rule behavioral1/memory/2744-1-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000c00000001445e-3.dat upx behavioral1/memory/2744-4-0x0000000000030000-0x000000000003F000-memory.dmp upx behavioral1/memory/2208-12-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2744-20-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\docyanx.dll ad8cbf56dbb0c1dd0a519c630360e174.exe File created C:\Windows\SysWOW64\docyanxk.exe ad8cbf56dbb0c1dd0a519c630360e174.exe File opened for modification C:\Windows\SysWOW64\docyanxk.exe ad8cbf56dbb0c1dd0a519c630360e174.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2744 ad8cbf56dbb0c1dd0a519c630360e174.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2208 2744 ad8cbf56dbb0c1dd0a519c630360e174.exe 28 PID 2744 wrote to memory of 2208 2744 ad8cbf56dbb0c1dd0a519c630360e174.exe 28 PID 2744 wrote to memory of 2208 2744 ad8cbf56dbb0c1dd0a519c630360e174.exe 28 PID 2744 wrote to memory of 2208 2744 ad8cbf56dbb0c1dd0a519c630360e174.exe 28 PID 2744 wrote to memory of 2556 2744 ad8cbf56dbb0c1dd0a519c630360e174.exe 29 PID 2744 wrote to memory of 2556 2744 ad8cbf56dbb0c1dd0a519c630360e174.exe 29 PID 2744 wrote to memory of 2556 2744 ad8cbf56dbb0c1dd0a519c630360e174.exe 29 PID 2744 wrote to memory of 2556 2744 ad8cbf56dbb0c1dd0a519c630360e174.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad8cbf56dbb0c1dd0a519c630360e174.exe"C:\Users\Admin\AppData\Local\Temp\ad8cbf56dbb0c1dd0a519c630360e174.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\docyanxk.exeC:\Windows\system32\docyanxk.exe ˜‰2⤵
- Executes dropped EXE
PID:2208
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ad8cbf56dbb0c1dd0a519c630360e174.exe.bat2⤵
- Deletes itself
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD514981314f1790335591ec878284cb49e
SHA165c25b1d96d8304acdd510b49a6dbf592d060f34
SHA2565bba35660c0018591193cae84b7f27cfe75945f2770f27c4f9e191fbfd7f4a20
SHA512d402faad96f1048581d01b184f399edcf38b4830c7145e98964f17ecd14eaf222b2edf33e1c106258c4c4bed2dc94db103301df782cbf9e2262327804c01b819
-
Filesize
12KB
MD5ad8cbf56dbb0c1dd0a519c630360e174
SHA17bb9b372e65c6805bb1eebcfd84c007edec1fdfd
SHA2560b6edaa6e020408d10809ec220f5ce97a307b760573391f1cd27586bfa37f999
SHA5128f6b83a4f9df383eee278301986deffdb42aeb8cc81f94fbb37527ee4e39593b71ed5bc24f2c9c319d321cf437ececf16092cb9244b0a45077cf1738fb987f30