Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
b3fc50146803244f3c4223079f98fb26.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b3fc50146803244f3c4223079f98fb26.exe
Resource
win10v2004-20240226-en
General
-
Target
b3fc50146803244f3c4223079f98fb26.exe
-
Size
15KB
-
MD5
b3fc50146803244f3c4223079f98fb26
-
SHA1
c55c32c325c19737ad6f5de8057e0f51ae133533
-
SHA256
4f4e041170e31ceefdf3ee4e9b6e63ff327e781da698c8fc03c68fef8d58cf1f
-
SHA512
5a1cf5844145c223bacd9775f461c856d041620a2b8647acaf10be5bf8e34101a827eff33de486143e79c52bfbb7882a378a09dc60ace0937cfd251fc3eb76b9
-
SSDEEP
384:m8W/WoiGOu1TlaKDXf/haSAsw6vBmw6zhQ+16frbbn7:VKJbh2sw6dit16zT
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\F72F298E\ImagePath = "C:\\Windows\\system32\\BA71D467.EXE -k" b3fc50146803244f3c4223079f98fb26.exe -
Executes dropped EXE 1 IoCs
pid Process 3076 BA71D467.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\BA71D467.EXE b3fc50146803244f3c4223079f98fb26.exe File created C:\Windows\SysWOW64\BA71D467.EXE BA71D467.EXE File created C:\Windows\SysWOW64\9C41A66.DLL BA71D467.EXE File created C:\Windows\SysWOW64\delme.bat b3fc50146803244f3c4223079f98fb26.exe File created C:\Windows\SysWOW64\BA71D467.EXE b3fc50146803244f3c4223079f98fb26.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3280 b3fc50146803244f3c4223079f98fb26.exe 3280 b3fc50146803244f3c4223079f98fb26.exe 3076 BA71D467.EXE 3076 BA71D467.EXE 3076 BA71D467.EXE 3076 BA71D467.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3280 wrote to memory of 3820 3280 b3fc50146803244f3c4223079f98fb26.exe 92 PID 3280 wrote to memory of 3820 3280 b3fc50146803244f3c4223079f98fb26.exe 92 PID 3280 wrote to memory of 3820 3280 b3fc50146803244f3c4223079f98fb26.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3fc50146803244f3c4223079f98fb26.exe"C:\Users\Admin\AppData\Local\Temp\b3fc50146803244f3c4223079f98fb26.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\delme.bat2⤵PID:3820
-
-
C:\Windows\SysWOW64\BA71D467.EXEC:\Windows\SysWOW64\BA71D467.EXE -k1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5b3fc50146803244f3c4223079f98fb26
SHA1c55c32c325c19737ad6f5de8057e0f51ae133533
SHA2564f4e041170e31ceefdf3ee4e9b6e63ff327e781da698c8fc03c68fef8d58cf1f
SHA5125a1cf5844145c223bacd9775f461c856d041620a2b8647acaf10be5bf8e34101a827eff33de486143e79c52bfbb7882a378a09dc60ace0937cfd251fc3eb76b9
-
Filesize
211B
MD526ce4217f57d8e64ead008cce5cc5a5d
SHA17f56c1149878931729464795a954913a14dca080
SHA256deb2ebee0c863b5a5e66f14332d3f7b18ce03f675004e1d773263494ca3308a7
SHA51207dbbe534390bb0f41383d4ba74c54c62e50eaa0c4de60e7b13e83027fc770ebdc442f88cdaf98e9b14786696c830c54e02163dfd501ea17c96ef20c08e5fcde