Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 06:21
Behavioral task
behavioral1
Sample
c011583cd6bc26964b3d9924a5efc3f1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c011583cd6bc26964b3d9924a5efc3f1.exe
Resource
win10v2004-20240226-en
General
-
Target
c011583cd6bc26964b3d9924a5efc3f1.exe
-
Size
280KB
-
MD5
c011583cd6bc26964b3d9924a5efc3f1
-
SHA1
077fbdf7e9a78e1eea52399753aace2c5696f423
-
SHA256
e5696be2b831f4abd7dacd0eb304e64ae4c1f61135593df4af84aabcdc807fb1
-
SHA512
d4df8a5cfcea0d27723747211980ccc9dd5f23bc762196034ab6585e8e16eaa33fb930639b7049457afc04eeb768fc6f4e1a6af9c3cbf26ef3e75a31b84cbdab
-
SSDEEP
6144:/48uaZG1amNB9ZzxjipBb2O+Hh3l2UJaHVS912HUvf5725t4B4:g8uadsbtjiziHaU024Up7Y4B4
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000c0000000226fd-7.dat aspack_v212_v242 behavioral2/files/0x000c0000000226fd-13.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 1604 wpabaln32.exe 4876 wpabaln32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\wpabaln32.exe c011583cd6bc26964b3d9924a5efc3f1.exe File opened for modification \??\c:\windows\SysWOW64\wpabaln32.exe c011583cd6bc26964b3d9924a5efc3f1.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2268 c011583cd6bc26964b3d9924a5efc3f1.exe 1604 wpabaln32.exe 4876 wpabaln32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2268 wrote to memory of 1604 2268 c011583cd6bc26964b3d9924a5efc3f1.exe 90 PID 2268 wrote to memory of 1604 2268 c011583cd6bc26964b3d9924a5efc3f1.exe 90 PID 2268 wrote to memory of 1604 2268 c011583cd6bc26964b3d9924a5efc3f1.exe 90 PID 1604 wrote to memory of 4876 1604 wpabaln32.exe 91 PID 1604 wrote to memory of 4876 1604 wpabaln32.exe 91 PID 1604 wrote to memory of 4876 1604 wpabaln32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c011583cd6bc26964b3d9924a5efc3f1.exe"C:\Users\Admin\AppData\Local\Temp\c011583cd6bc26964b3d9924a5efc3f1.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
\??\c:\windows\SysWOW64\wpabaln32.exec:\windows\system32\wpabaln32.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
\??\c:\windows\SysWOW64\wpabaln32.exec:\windows\system32\wpabaln32.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4876
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
273KB
MD5a28338eba449756a9a5ffad423527539
SHA170bb5aba81689824826edd222a5dad050de3ca77
SHA25610c590d1f0cd2f55a71adab9ba21f042bdafa767c5784ee91d8949923cd437ce
SHA5121b5701d75f88eaca955c8f67219f30f643493c7059b28bb75f6061d68dbbb0a7bdc3552da11a9884ddaed77a57347748828f65f5e6347d6446d9bbc12b114e78
-
Filesize
280KB
MD5c011583cd6bc26964b3d9924a5efc3f1
SHA1077fbdf7e9a78e1eea52399753aace2c5696f423
SHA256e5696be2b831f4abd7dacd0eb304e64ae4c1f61135593df4af84aabcdc807fb1
SHA512d4df8a5cfcea0d27723747211980ccc9dd5f23bc762196034ab6585e8e16eaa33fb930639b7049457afc04eeb768fc6f4e1a6af9c3cbf26ef3e75a31b84cbdab