Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 18:19
Static task
static1
Behavioral task
behavioral1
Sample
b8101cf694f63c5b01e69d91ce3458e0.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b8101cf694f63c5b01e69d91ce3458e0.exe
Resource
win10v2004-20240226-en
General
-
Target
b8101cf694f63c5b01e69d91ce3458e0.exe
-
Size
142KB
-
MD5
b8101cf694f63c5b01e69d91ce3458e0
-
SHA1
1f889b92f7cdb2d268c2f242af40fbecf05226e7
-
SHA256
b609680f2065e8c04dfb4b892e09efa2246a11199bed14234ec8f974632e3597
-
SHA512
dc18074e1ecdb99b7850a1e176b03d509b201d99d779cd280049593118c1c6071db56e6bd0eb03144c63fccfddce97fb583fca858a6ca3d69b592a6b42023719
-
SSDEEP
3072:gGXza9FuuiYdyc1gBa4BM6GvNbTclN5SCaDx4cSL:dDa9FuODqGvNPcv7ISL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3108 msa.exe -
resource yara_rule behavioral2/memory/3108-7-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3904-7863-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3108-11846-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3904-19006-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3108-27832-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3108-36509-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3108-44830-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3108-61212-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3108-77523-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3108-93308-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3108-110118-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3108-124948-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3108-130416-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3108-130418-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3108-130419-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3108-130421-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3108-130422-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/3108-130423-0x0000000000400000-0x0000000000441000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{7B02EF0B-A410-4938-8480-9BA26420A627}.job msa.exe File opened for modification C:\Windows\Tasks\{7B02EF0B-A410-4938-8480-9BA26420A627}.job msa.exe File created C:\Windows\Tasks\{7B02EF0B-A410-4938-8480-9BA26420A627}.job b8101cf694f63c5b01e69d91ce3458e0.exe File opened for modification C:\Windows\Tasks\{7B02EF0B-A410-4938-8480-9BA26420A627}.job b8101cf694f63c5b01e69d91ce3458e0.exe File created C:\Windows\msa.exe b8101cf694f63c5b01e69d91ce3458e0.exe File opened for modification C:\Windows\msa.exe b8101cf694f63c5b01e69d91ce3458e0.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\International msa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe 3108 msa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3904 wrote to memory of 3108 3904 b8101cf694f63c5b01e69d91ce3458e0.exe 94 PID 3904 wrote to memory of 3108 3904 b8101cf694f63c5b01e69d91ce3458e0.exe 94 PID 3904 wrote to memory of 3108 3904 b8101cf694f63c5b01e69d91ce3458e0.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8101cf694f63c5b01e69d91ce3458e0.exe"C:\Users\Admin\AppData\Local\Temp\b8101cf694f63c5b01e69d91ce3458e0.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\msa.exeC:\Windows\msa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
362B
MD5ea54279eea266aa948f406c3617ac6c6
SHA1b3c8a3d6e2e8a856e6bbb145bff51ce23cffa917
SHA256bba8cf3cd2bcf547113c3af91d0c925188ee667b0f03752bee4d1c52fbc1f2c0
SHA512f2dc6f044f2e093990a35077bcac2ec33845473a2c2be34ae27bac937f39b8c840c6c43e693db732dbef065ba8481c0e240440e92a26b26ab8337f7df038e0b8
-
Filesize
142KB
MD5b8101cf694f63c5b01e69d91ce3458e0
SHA11f889b92f7cdb2d268c2f242af40fbecf05226e7
SHA256b609680f2065e8c04dfb4b892e09efa2246a11199bed14234ec8f974632e3597
SHA512dc18074e1ecdb99b7850a1e176b03d509b201d99d779cd280049593118c1c6071db56e6bd0eb03144c63fccfddce97fb583fca858a6ca3d69b592a6b42023719