Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 17:02
Static task
static1
Behavioral task
behavioral1
Sample
b7eae23fecfbf30aa5476c7129e8e8fe.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b7eae23fecfbf30aa5476c7129e8e8fe.exe
Resource
win10v2004-20240226-en
General
-
Target
b7eae23fecfbf30aa5476c7129e8e8fe.exe
-
Size
208KB
-
MD5
b7eae23fecfbf30aa5476c7129e8e8fe
-
SHA1
d747dbec2e36a24f9695b0601d686fb6baac0a23
-
SHA256
d8e015987ba4ae7c8249c9ef0d4810bdaaeb4a78910cd33f52273bf60f6aa140
-
SHA512
2e2814581eb64f6f7e3b4d522f2a65a42f3ead32b38fdcf39fbc8105bb66b4ab022d7a35c58f645ad78562c3f2e19c392de9de24bfe04e68858ef7a9445ee613
-
SSDEEP
6144:Rl0n6aurwlfCBdNmUzbxcPxeLppHe3nL8T/:In6aurwlqZbxcPwLy3u
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2472 u.dll 2704 u.dll 1572 mpress.exe -
Loads dropped DLL 6 IoCs
pid Process 2992 cmd.exe 2992 cmd.exe 2992 cmd.exe 2992 cmd.exe 2704 u.dll 2704 u.dll -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2992 2132 b7eae23fecfbf30aa5476c7129e8e8fe.exe 29 PID 2132 wrote to memory of 2992 2132 b7eae23fecfbf30aa5476c7129e8e8fe.exe 29 PID 2132 wrote to memory of 2992 2132 b7eae23fecfbf30aa5476c7129e8e8fe.exe 29 PID 2132 wrote to memory of 2992 2132 b7eae23fecfbf30aa5476c7129e8e8fe.exe 29 PID 2992 wrote to memory of 2472 2992 cmd.exe 30 PID 2992 wrote to memory of 2472 2992 cmd.exe 30 PID 2992 wrote to memory of 2472 2992 cmd.exe 30 PID 2992 wrote to memory of 2472 2992 cmd.exe 30 PID 2992 wrote to memory of 2704 2992 cmd.exe 31 PID 2992 wrote to memory of 2704 2992 cmd.exe 31 PID 2992 wrote to memory of 2704 2992 cmd.exe 31 PID 2992 wrote to memory of 2704 2992 cmd.exe 31 PID 2704 wrote to memory of 1572 2704 u.dll 32 PID 2704 wrote to memory of 1572 2704 u.dll 32 PID 2704 wrote to memory of 1572 2704 u.dll 32 PID 2704 wrote to memory of 1572 2704 u.dll 32 PID 2992 wrote to memory of 2756 2992 cmd.exe 33 PID 2992 wrote to memory of 2756 2992 cmd.exe 33 PID 2992 wrote to memory of 2756 2992 cmd.exe 33 PID 2992 wrote to memory of 2756 2992 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7eae23fecfbf30aa5476c7129e8e8fe.exe"C:\Users\Admin\AppData\Local\Temp\b7eae23fecfbf30aa5476c7129e8e8fe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1545.tmp\vir.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save b7eae23fecfbf30aa5476c7129e8e8fe.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\312E.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\312E.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe312F.tmp"4⤵
- Executes dropped EXE
PID:1572
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵PID:2756
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5194d70876631e64ecd6328853a71b0d8
SHA164ba776c544fc5f98d612292c51d1bf658a99f92
SHA256d5280a9f04c6ae950b75ca55a332eed2dff2ce7d5eb2e0e5b0e996795dcfcba9
SHA5124c39607795b1adca5707caf461e6a0ae2149caa1ead1eabbe834eabf6ba6a5bd0cbb8bcaa82516379e6df08765893685cd19ec3f4b45f952d15d4688b8dae12c
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
41KB
MD57aa367dca7be65e07b16bd69f06263e3
SHA1d447739251408f8e8490a9d307927bfbe41737ce
SHA256738bf50547320b0683af727ad6d430f2e7b83c846fe24f91527b7ee263bfa076
SHA512d7884589d7d12a628c9e07b77b3b793fa91f67fe13563e7b072ca864e053e6b7d711852e30ae1c877576b8ad47f67d2826e8ee711e6b65a329baa57492fe31b3
-
Filesize
207KB
MD55c8f9a1066119dccaf7e3a3aadb31b34
SHA1a284592f9d878c5ec3b524d4630074b7d72c42f3
SHA25655053a5a17c83669902250dd3d0299dd83bdc2b28460eb0d7c0da2378dd11828
SHA512ac0b13ceeb82ed55cfe20e63149b7bfd70f7b91b3672b37fd10838ffb8b0a6e10d249bea0cb6949d7d3a13827b71e2d52c7ad4ce9ce855365091780391027da0
-
Filesize
741KB
MD5fede3b152faf828326a1966a63d0ce68
SHA103673b268f912613e6de2dcebd79efa4cd9b9915
SHA2569945f0e7e578397ab4addf6e01fde79c2983e20c01120477a59d932c6866aefd
SHA512b1f253bb479c81644182ff1854e8bed70616d8824464c2d60b3000791b84afb0fa5be1128d4369cb8540680fcd71bbb4554d8c67336383d0504e8dda6b5487b1
-
Filesize
700KB
MD53c9568b0d86a865f9f73d9c0967cfdad
SHA13270df3e0e600f4df2c3cbc384837693a8a3a83e
SHA256c7b97a001b39e17382e929aad924555f3d21886b86aed38cffd660490801d1d6
SHA512bd423d1d57823b1bf6db42aeec199aa93178a9317ead85b42b60e091aaf4f73ce721bc07fda4750e112c4dccb9d87e21d5793965da9d6e92b0c5bed92c26876f
-
Filesize
1KB
MD5283570478a3ef4f7da0bd288285bae8c
SHA1cb0f56b245760eb0b43bbba4d1097ca0ba29401c
SHA25662b99f93eede37eaadd050a81ba51fd91bd2bfe345c8a124352427d2d839dfa4
SHA512634026cc16a08674ecc2a53a13bfb6c54b4ceec32f056de099b10e6682c7adec73d536d13b0ef4100b5498537bbf1381e3677f17a153824aee16ae4ed18b1c2a
-
Filesize
1KB
MD5d451920bf82e0b62c4cf25d0a3c2284e
SHA12e21d21ed8a26a2029f5badcb41b95c32ba188b8
SHA256cb8785135d376cb7de0512f9969fe318985abcc9dbe50b6abd6f21fc1a5e7f0f
SHA51248e0e1c6ce883b1b6e9e1351fafc606706675ae5554249fe526fa5b25ca15b8f57ec8617cf059b11ccbdea384f4f39e681fe3b23de1705b452c190294b292aae