Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
c106be2887b955a3ab2a565b6a1f8aa1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c106be2887b955a3ab2a565b6a1f8aa1.exe
Resource
win10v2004-20240226-en
General
-
Target
c106be2887b955a3ab2a565b6a1f8aa1.exe
-
Size
208KB
-
MD5
c106be2887b955a3ab2a565b6a1f8aa1
-
SHA1
e3a8e2e8c4c8f97d7c44157584b9f2fa296b45eb
-
SHA256
53ff05aced3d23957ff7ed482000ff3849cd806bb9819cb378fbbaa82f0871be
-
SHA512
5c3737be879d2cf10c50dfc9af10b904898476e4619d0f45689029a0285849179fa4c9bbc8593a6ba9e20201adcebf3a91b017f57ac96c4245af46a68fa3ecda
-
SSDEEP
6144:ml4mjZF//FfhQOvrvkEfmNE4Gavvxx+GYsAdR7sXb+4:ur//Dvkh1hvGR7sX64
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4944 u.dll 3248 mpress.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\Local Settings calc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4868 OpenWith.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1888 wrote to memory of 212 1888 c106be2887b955a3ab2a565b6a1f8aa1.exe 90 PID 1888 wrote to memory of 212 1888 c106be2887b955a3ab2a565b6a1f8aa1.exe 90 PID 1888 wrote to memory of 212 1888 c106be2887b955a3ab2a565b6a1f8aa1.exe 90 PID 212 wrote to memory of 4944 212 cmd.exe 91 PID 212 wrote to memory of 4944 212 cmd.exe 91 PID 212 wrote to memory of 4944 212 cmd.exe 91 PID 4944 wrote to memory of 3248 4944 u.dll 93 PID 4944 wrote to memory of 3248 4944 u.dll 93 PID 4944 wrote to memory of 3248 4944 u.dll 93 PID 212 wrote to memory of 4556 212 cmd.exe 96 PID 212 wrote to memory of 4556 212 cmd.exe 96 PID 212 wrote to memory of 4556 212 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\c106be2887b955a3ab2a565b6a1f8aa1.exe"C:\Users\Admin\AppData\Local\Temp\c106be2887b955a3ab2a565b6a1f8aa1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3875.tmp\vir.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save c106be2887b955a3ab2a565b6a1f8aa1.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\3911.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\3911.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe3912.tmp"4⤵
- Executes dropped EXE
PID:3248
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵
- Modifies registry class
PID:4556
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4868
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5053bcbe199bcda90f899710afd295b73
SHA1532f25a250c01c4ce6e01d4cc83135ee87897ff0
SHA25699eef0d2c41a482543958f87c2a1471994209110e1aba1b8b5f11bd2ec68ae5d
SHA512d5acee44fa8e7fb30fea697790fc51014fdb0d5c534dc783a3c750fac99f8c5f40be0ebcc28533f6bf1fff26793cb54757a373f1b51cf3a410b56e30ea32c445
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
41KB
MD59cdcf02f847ddde1f3b62c676c5cc737
SHA11e28bc7716cb6adb55b1b397dbabbe31adba3cf2
SHA256d7726cc05bcd788912a23fc85f233775da28cb0d4d2920c2be66e5cc69e2b7ae
SHA512438303dceafa36ac40271d6b7759248357109cc479a53dd4eb472ab35d51f333f629be2da54fc113bcdcf2bb4bdf4201b5075351842d20d7e818c80a31b88e92
-
Filesize
24KB
MD58dd52bfe2f56ec20402bef5dafe49e83
SHA1c29e3c436ab92db5326b5d31455202accf8cc98f
SHA256e35ee21199e637983ccc35c7b648e694f6e5d6993ec12fe99db553270331a880
SHA512ede99c417e95ef2fd36e8532d7e90cc4ba81800a8d826a0a17ee87e48152013e1cda09bdc1b74f567ee393248a283a443297c9e249ccd544cfb6fcd1ee2b8871
-
Filesize
700KB
MD5ac3e2f16df5b8e004bc7528957957c95
SHA1318dfb96abdc8e9d3778788dfdbb1f3dba885fba
SHA256c53ac431faed8f5ab7c67b254f913efe0dceaafdbf26b02b930d07f45d840fe2
SHA5124c60d3b255c38807a104e4362493dbf651fb8893633e94ee9a4c69770773f8d7bf95d310051154b9bd74d6eb1993626a5eb107e74e891d681f0398c64a7ebaf4
-
Filesize
1KB
MD568be65ceb968ca7ce7adfa75c1a04387
SHA14e26ceae909ac554f653207908307d59d99234ca
SHA256b46f0f1b5c2907e0e69ad78c21592ef3b836321a7f79cd62f0b101efb7aa7695
SHA512d651d655f40014e0125d192548efff170e990d3311f7f2abbeb9c6ad20eb902054c96d95f693dda721efd1da92e2156366071460a8002ca5527e21c2ee6e9af6