Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 16:13

General

  • Target

    c106be2887b955a3ab2a565b6a1f8aa1.exe

  • Size

    208KB

  • MD5

    c106be2887b955a3ab2a565b6a1f8aa1

  • SHA1

    e3a8e2e8c4c8f97d7c44157584b9f2fa296b45eb

  • SHA256

    53ff05aced3d23957ff7ed482000ff3849cd806bb9819cb378fbbaa82f0871be

  • SHA512

    5c3737be879d2cf10c50dfc9af10b904898476e4619d0f45689029a0285849179fa4c9bbc8593a6ba9e20201adcebf3a91b017f57ac96c4245af46a68fa3ecda

  • SSDEEP

    6144:ml4mjZF//FfhQOvrvkEfmNE4Gavvxx+GYsAdR7sXb+4:ur//Dvkh1hvGR7sX64

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c106be2887b955a3ab2a565b6a1f8aa1.exe
    "C:\Users\Admin\AppData\Local\Temp\c106be2887b955a3ab2a565b6a1f8aa1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3875.tmp\vir.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:212
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save c106be2887b955a3ab2a565b6a1f8aa1.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4944
        • C:\Users\Admin\AppData\Local\Temp\3911.tmp\mpress.exe
          "C:\Users\Admin\AppData\Local\Temp\3911.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe3912.tmp"
          4⤵
          • Executes dropped EXE
          PID:3248
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
        • Modifies registry class
        PID:4556
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4868

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\3875.tmp\vir.bat

          Filesize

          1KB

          MD5

          053bcbe199bcda90f899710afd295b73

          SHA1

          532f25a250c01c4ce6e01d4cc83135ee87897ff0

          SHA256

          99eef0d2c41a482543958f87c2a1471994209110e1aba1b8b5f11bd2ec68ae5d

          SHA512

          d5acee44fa8e7fb30fea697790fc51014fdb0d5c534dc783a3c750fac99f8c5f40be0ebcc28533f6bf1fff26793cb54757a373f1b51cf3a410b56e30ea32c445

        • C:\Users\Admin\AppData\Local\Temp\3911.tmp\mpress.exe

          Filesize

          100KB

          MD5

          e42b81b9636152c78ba480c1c47d3c7f

          SHA1

          66a2fca3925428ee91ad9df5b76b90b34d28e0f8

          SHA256

          7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

          SHA512

          4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

        • C:\Users\Admin\AppData\Local\Temp\exe3912.tmp

          Filesize

          41KB

          MD5

          9cdcf02f847ddde1f3b62c676c5cc737

          SHA1

          1e28bc7716cb6adb55b1b397dbabbe31adba3cf2

          SHA256

          d7726cc05bcd788912a23fc85f233775da28cb0d4d2920c2be66e5cc69e2b7ae

          SHA512

          438303dceafa36ac40271d6b7759248357109cc479a53dd4eb472ab35d51f333f629be2da54fc113bcdcf2bb4bdf4201b5075351842d20d7e818c80a31b88e92

        • C:\Users\Admin\AppData\Local\Temp\mpr39EC.tmp

          Filesize

          24KB

          MD5

          8dd52bfe2f56ec20402bef5dafe49e83

          SHA1

          c29e3c436ab92db5326b5d31455202accf8cc98f

          SHA256

          e35ee21199e637983ccc35c7b648e694f6e5d6993ec12fe99db553270331a880

          SHA512

          ede99c417e95ef2fd36e8532d7e90cc4ba81800a8d826a0a17ee87e48152013e1cda09bdc1b74f567ee393248a283a443297c9e249ccd544cfb6fcd1ee2b8871

        • C:\Users\Admin\AppData\Local\Temp\s.dll

          Filesize

          700KB

          MD5

          ac3e2f16df5b8e004bc7528957957c95

          SHA1

          318dfb96abdc8e9d3778788dfdbb1f3dba885fba

          SHA256

          c53ac431faed8f5ab7c67b254f913efe0dceaafdbf26b02b930d07f45d840fe2

          SHA512

          4c60d3b255c38807a104e4362493dbf651fb8893633e94ee9a4c69770773f8d7bf95d310051154b9bd74d6eb1993626a5eb107e74e891d681f0398c64a7ebaf4

        • C:\Users\Admin\AppData\Local\Temp\vir.bat

          Filesize

          1KB

          MD5

          68be65ceb968ca7ce7adfa75c1a04387

          SHA1

          4e26ceae909ac554f653207908307d59d99234ca

          SHA256

          b46f0f1b5c2907e0e69ad78c21592ef3b836321a7f79cd62f0b101efb7aa7695

          SHA512

          d651d655f40014e0125d192548efff170e990d3311f7f2abbeb9c6ad20eb902054c96d95f693dda721efd1da92e2156366071460a8002ca5527e21c2ee6e9af6

        • memory/1888-0-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/1888-1-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/1888-71-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/3248-56-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3248-63-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB