Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 15:15
Behavioral task
behavioral1
Sample
b5038e4dd7e93055c95d32d4a6dc24d3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5038e4dd7e93055c95d32d4a6dc24d3.exe
Resource
win10v2004-20240226-en
General
-
Target
b5038e4dd7e93055c95d32d4a6dc24d3.exe
-
Size
12KB
-
MD5
b5038e4dd7e93055c95d32d4a6dc24d3
-
SHA1
bd73590351b719ee76408c9ba45e94d51007a572
-
SHA256
15cf59f51f4db331ebf27dbedd9dd1338fd181db4706f5d4a4f1d5d557f0ee61
-
SHA512
eabd0aaf8b1d727610b2f1cd40f310e89a35102ad67b22392fac2e45867bcb014978feb79c54aa59201f8ed391d84a1287d60634a12dee59bfabd6e147d0f44a
-
SSDEEP
192:3eK+RH3ErhTxWOZGzDbhtd/KZEsvwnZKnG8FPedmqMlmSIYgV3RAtUu+9yoDSP4b:OK+F3EdTxZuD/d/7svyZonFPmONIYgDr
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2724 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2912 rexljehk.exe -
Loads dropped DLL 2 IoCs
pid Process 2100 b5038e4dd7e93055c95d32d4a6dc24d3.exe 2100 b5038e4dd7e93055c95d32d4a6dc24d3.exe -
resource yara_rule behavioral1/memory/2100-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/files/0x000b000000013413-3.dat upx behavioral1/memory/2912-11-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2100-12-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rexljeh.dll b5038e4dd7e93055c95d32d4a6dc24d3.exe File created C:\Windows\SysWOW64\rexljehk.exe b5038e4dd7e93055c95d32d4a6dc24d3.exe File opened for modification C:\Windows\SysWOW64\rexljehk.exe b5038e4dd7e93055c95d32d4a6dc24d3.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2912 2100 b5038e4dd7e93055c95d32d4a6dc24d3.exe 28 PID 2100 wrote to memory of 2912 2100 b5038e4dd7e93055c95d32d4a6dc24d3.exe 28 PID 2100 wrote to memory of 2912 2100 b5038e4dd7e93055c95d32d4a6dc24d3.exe 28 PID 2100 wrote to memory of 2912 2100 b5038e4dd7e93055c95d32d4a6dc24d3.exe 28 PID 2100 wrote to memory of 2724 2100 b5038e4dd7e93055c95d32d4a6dc24d3.exe 29 PID 2100 wrote to memory of 2724 2100 b5038e4dd7e93055c95d32d4a6dc24d3.exe 29 PID 2100 wrote to memory of 2724 2100 b5038e4dd7e93055c95d32d4a6dc24d3.exe 29 PID 2100 wrote to memory of 2724 2100 b5038e4dd7e93055c95d32d4a6dc24d3.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5038e4dd7e93055c95d32d4a6dc24d3.exe"C:\Users\Admin\AppData\Local\Temp\b5038e4dd7e93055c95d32d4a6dc24d3.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\rexljehk.exeC:\Windows\system32\rexljehk.exe ˜‰2⤵
- Executes dropped EXE
PID:2912
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\b5038e4dd7e93055c95d32d4a6dc24d3.exe.bat2⤵
- Deletes itself
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD54976157c91b8f2a456384310deb68760
SHA19ae88dd034fcfd814a697974200398ce38b03533
SHA256e56004e8bac1487131931b72a4432bf319b4e42eb3551dcbe2ce95fe6d3125fe
SHA512dacc16f6551201c7e6f46961fb33525b53cbf74a3bea1380af2b056676ed0eab9b6d76358f9bacd2711904046519af577ac4a40315f1f1da4ce8bbf290c4b28b
-
Filesize
12KB
MD5b5038e4dd7e93055c95d32d4a6dc24d3
SHA1bd73590351b719ee76408c9ba45e94d51007a572
SHA25615cf59f51f4db331ebf27dbedd9dd1338fd181db4706f5d4a4f1d5d557f0ee61
SHA512eabd0aaf8b1d727610b2f1cd40f310e89a35102ad67b22392fac2e45867bcb014978feb79c54aa59201f8ed391d84a1287d60634a12dee59bfabd6e147d0f44a