Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 16:05
Behavioral task
behavioral1
Sample
b7d039c2559b2bd19f00153507cff857.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7d039c2559b2bd19f00153507cff857.exe
Resource
win10v2004-20240226-en
General
-
Target
b7d039c2559b2bd19f00153507cff857.exe
-
Size
11KB
-
MD5
b7d039c2559b2bd19f00153507cff857
-
SHA1
6aeedde8ba29e7db3dcd9cd51e64d4985aff488b
-
SHA256
63f33a1db75f08091271c7eaa1be0071cd000331ab05659e445d07e8058f561f
-
SHA512
7974a78db8d11303466cf3228ddda7d918056bc6154e815e89a30aaf1cc1a287a3ed05d5cc22445c90ae1ddaff361bdb8656d5609aa0dcd48278daead9ca95f8
-
SSDEEP
192:CuxZH2B7O5mv/scm+eTo/+Dkl4usLZRtC45v2CmZ4Vlt3twKeYOTpzs+J:CuLWB7ImnE+eTo/g84usLRCobHFdw2OZ
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1044 comboausk.exe -
resource yara_rule behavioral2/memory/4540-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x000700000002322d-4.dat upx behavioral2/memory/4540-8-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/1044-10-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\comboaus.dll b7d039c2559b2bd19f00153507cff857.exe File created C:\Windows\SysWOW64\comboausk.exe b7d039c2559b2bd19f00153507cff857.exe File opened for modification C:\Windows\SysWOW64\comboausk.exe b7d039c2559b2bd19f00153507cff857.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4540 b7d039c2559b2bd19f00153507cff857.exe 4540 b7d039c2559b2bd19f00153507cff857.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4540 wrote to memory of 1044 4540 b7d039c2559b2bd19f00153507cff857.exe 94 PID 4540 wrote to memory of 1044 4540 b7d039c2559b2bd19f00153507cff857.exe 94 PID 4540 wrote to memory of 1044 4540 b7d039c2559b2bd19f00153507cff857.exe 94 PID 4540 wrote to memory of 3348 4540 b7d039c2559b2bd19f00153507cff857.exe 96 PID 4540 wrote to memory of 3348 4540 b7d039c2559b2bd19f00153507cff857.exe 96 PID 4540 wrote to memory of 3348 4540 b7d039c2559b2bd19f00153507cff857.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7d039c2559b2bd19f00153507cff857.exe"C:\Users\Admin\AppData\Local\Temp\b7d039c2559b2bd19f00153507cff857.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\comboausk.exeC:\Windows\system32\comboausk.exe ˜‰2⤵
- Executes dropped EXE
PID:1044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\b7d039c2559b2bd19f00153507cff857.exe.bat2⤵PID:3348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD51f606769767ae757091dd6b3937c6816
SHA18937c8a58ef4eebb85e37a130774d799cc187c1b
SHA2564f8cb5f67bb58c547e1c66309b23b77d7cd71a7e3ac37f9c486aa4a52b56e759
SHA512272545b860533dcfdd4cbc0a867b73a08e7c3a9159d5ae64d51ffb23c33076296bc17c191a1aa9dce48321e0fb8316fe620d50c6937eea77bb3b91452a51e9fb
-
Filesize
11KB
MD5b7d039c2559b2bd19f00153507cff857
SHA16aeedde8ba29e7db3dcd9cd51e64d4985aff488b
SHA25663f33a1db75f08091271c7eaa1be0071cd000331ab05659e445d07e8058f561f
SHA5127974a78db8d11303466cf3228ddda7d918056bc6154e815e89a30aaf1cc1a287a3ed05d5cc22445c90ae1ddaff361bdb8656d5609aa0dcd48278daead9ca95f8