Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 13:43

General

  • Target

    c0bbcc1266d11434d5a50ba752c73069.exe

  • Size

    14KB

  • MD5

    c0bbcc1266d11434d5a50ba752c73069

  • SHA1

    cc8dc01210ca021cb903181d65874373d88bc79f

  • SHA256

    b510ef45ffff63592b23eed367794631fe67f1dd14e473cdcfd87ec2ab2bf825

  • SHA512

    99b86e8612c0f5287c837e6fbdc41fbecf7e5314f91863fdf448a513ba728fdb710bc6c1592d9a4af1028772e2e98a4ec6c6d46dea4e6c6a3dbc80ade8ecc7dd

  • SSDEEP

    192:iPonnKKesSt4q2VOtQKYpghjgR8cri+jz4GWGYOuI9kxCZfrhhTTBS+qGaIHD7Nc:YonK/sStGDg1J47vRY8BfrnlL3hVkl

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0bbcc1266d11434d5a50ba752c73069.exe
    "C:\Users\Admin\AppData\Local\Temp\c0bbcc1266d11434d5a50ba752c73069.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Windows\SysWOW64\ezcronk.exe
      C:\Windows\system32\ezcronk.exe ˜‰
      2⤵
      • Executes dropped EXE
      PID:4584
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\c0bbcc1266d11434d5a50ba752c73069.exe.bat
      2⤵
        PID:5044
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2616

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\c0bbcc1266d11434d5a50ba752c73069.exe.bat

        Filesize

        182B

        MD5

        483ac8ae179093ed3bb0081aa711974e

        SHA1

        11d3e01d5e4d05698db46f9f51af82fb0ad2d7d7

        SHA256

        4a544eacff9d1cb7ea0f594917bbd4ef55bef5556df45f78c60780c1a9fd14a5

        SHA512

        9f583d10be18107e120f53c0005e01e00fb91d12ca7694adf2e3e4fd1600f0b8007d4a37644126e4255489d15240cda0fd92ed2c9e85178a0850a2895226a354

      • C:\Windows\SysWOW64\ezcronk.exe

        Filesize

        14KB

        MD5

        c0bbcc1266d11434d5a50ba752c73069

        SHA1

        cc8dc01210ca021cb903181d65874373d88bc79f

        SHA256

        b510ef45ffff63592b23eed367794631fe67f1dd14e473cdcfd87ec2ab2bf825

        SHA512

        99b86e8612c0f5287c837e6fbdc41fbecf7e5314f91863fdf448a513ba728fdb710bc6c1592d9a4af1028772e2e98a4ec6c6d46dea4e6c6a3dbc80ade8ecc7dd

      • memory/4584-7-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/4988-0-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/4988-6-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB