Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 02:31
Behavioral task
behavioral1
Sample
b8415f2dcf8d9a9f6580b250abcf0e68.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8415f2dcf8d9a9f6580b250abcf0e68.exe
Resource
win10v2004-20240226-en
General
-
Target
b8415f2dcf8d9a9f6580b250abcf0e68.exe
-
Size
13KB
-
MD5
b8415f2dcf8d9a9f6580b250abcf0e68
-
SHA1
dbefda6a972730bca2f17e0fc468079ee21bc3d0
-
SHA256
0a30f2130ae316b2e838530db43a2b1fdc187f070199d03573531d8688c6eccf
-
SHA512
5b05bddf8d8f5b46eeaadf2af78622d830bc3606b3fa0aed3e636ef5031f35a16dd707af7bb94545f885396e8dc73d0703af0833fc54332c3dbd261662827aa9
-
SSDEEP
192:hJACzSxlKdsOWBNoKHD73ewHA5F9ZD2GBxzJlUu2k9iOtyKIv/99gO4:MCzSTmWBNRjTewgtdRxzJl/9TU9gd
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 368 docyanxk.exe -
resource yara_rule behavioral2/memory/3568-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/files/0x0007000000023202-4.dat upx behavioral2/memory/368-6-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3568-9-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\docyanx.dll b8415f2dcf8d9a9f6580b250abcf0e68.exe File created C:\Windows\SysWOW64\docyanxk.exe b8415f2dcf8d9a9f6580b250abcf0e68.exe File opened for modification C:\Windows\SysWOW64\docyanxk.exe b8415f2dcf8d9a9f6580b250abcf0e68.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3568 b8415f2dcf8d9a9f6580b250abcf0e68.exe 3568 b8415f2dcf8d9a9f6580b250abcf0e68.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3568 wrote to memory of 368 3568 b8415f2dcf8d9a9f6580b250abcf0e68.exe 96 PID 3568 wrote to memory of 368 3568 b8415f2dcf8d9a9f6580b250abcf0e68.exe 96 PID 3568 wrote to memory of 368 3568 b8415f2dcf8d9a9f6580b250abcf0e68.exe 96 PID 3568 wrote to memory of 3976 3568 b8415f2dcf8d9a9f6580b250abcf0e68.exe 97 PID 3568 wrote to memory of 3976 3568 b8415f2dcf8d9a9f6580b250abcf0e68.exe 97 PID 3568 wrote to memory of 3976 3568 b8415f2dcf8d9a9f6580b250abcf0e68.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8415f2dcf8d9a9f6580b250abcf0e68.exe"C:\Users\Admin\AppData\Local\Temp\b8415f2dcf8d9a9f6580b250abcf0e68.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\docyanxk.exeC:\Windows\system32\docyanxk.exe ˜‰2⤵
- Executes dropped EXE
PID:368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\b8415f2dcf8d9a9f6580b250abcf0e68.exe.bat2⤵PID:3976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD55755ccae4eba71fd6688740f54b4065c
SHA15c9490becbcbb4c0a95f687366a67f8bcf6512d4
SHA256b973e0fa0eda16f0b7939d2945d88a0a845d83787728d1f6fdf0b4bacfec7f74
SHA512616ab3d8234572489112ad6db95b2d4c388685249e7037f98ef49e49de023e9e89268207ef52f7de16298d9526d65d9dde34257ffdae48a0acfe373aae17e459
-
Filesize
13KB
MD5b8415f2dcf8d9a9f6580b250abcf0e68
SHA1dbefda6a972730bca2f17e0fc468079ee21bc3d0
SHA2560a30f2130ae316b2e838530db43a2b1fdc187f070199d03573531d8688c6eccf
SHA5125b05bddf8d8f5b46eeaadf2af78622d830bc3606b3fa0aed3e636ef5031f35a16dd707af7bb94545f885396e8dc73d0703af0833fc54332c3dbd261662827aa9