Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 01:27
Behavioral task
behavioral1
Sample
c21c377ffd6b6acf50fc1bab98035a42.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c21c377ffd6b6acf50fc1bab98035a42.exe
Resource
win10v2004-20240226-en
General
-
Target
c21c377ffd6b6acf50fc1bab98035a42.exe
-
Size
28KB
-
MD5
c21c377ffd6b6acf50fc1bab98035a42
-
SHA1
4cb9bdeb1bafaec4e33ff1684c922a0d53f0e5e9
-
SHA256
52b27ca757acfedf645f2aaff531d747b57ab1265150a287b78d0f4bef8875df
-
SHA512
c2ecdb1e2d3538643a033b4c291ca28073f28535ff3325af38f3f25faef0b0917e1a8132c2ba1e616a3f42f2f73f39acad5f253fc12061fa438fe9e463a74d67
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNv:Dv8IRRdsxq1DjJcqf4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1516 services.exe -
resource yara_rule behavioral1/memory/2860-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1516-12-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x000d000000014698-10.dat upx behavioral1/memory/2860-4-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2860-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1516-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2860-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1516-25-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1516-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1516-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1516-37-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1516-42-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1516-44-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1516-49-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2860-53-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1516-54-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2860-55-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1516-56-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x001000000000f680-66.dat upx behavioral1/memory/2860-76-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1516-77-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2860-81-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1516-82-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2860-83-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1516-84-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2860-88-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1516-89-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" c21c377ffd6b6acf50fc1bab98035a42.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe c21c377ffd6b6acf50fc1bab98035a42.exe File opened for modification C:\Windows\java.exe c21c377ffd6b6acf50fc1bab98035a42.exe File created C:\Windows\java.exe c21c377ffd6b6acf50fc1bab98035a42.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 1516 2860 c21c377ffd6b6acf50fc1bab98035a42.exe 28 PID 2860 wrote to memory of 1516 2860 c21c377ffd6b6acf50fc1bab98035a42.exe 28 PID 2860 wrote to memory of 1516 2860 c21c377ffd6b6acf50fc1bab98035a42.exe 28 PID 2860 wrote to memory of 1516 2860 c21c377ffd6b6acf50fc1bab98035a42.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c21c377ffd6b6acf50fc1bab98035a42.exe"C:\Users\Admin\AppData\Local\Temp\c21c377ffd6b6acf50fc1bab98035a42.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD50a790680e51946bb90712633a92edfec
SHA1b12d9b3e290d6c36ef1002859c2a51cbb83949fc
SHA25627c84ac01c579f2fd667d57d626cf5fa04bf2e1757e9c44108a64f08e11f517c
SHA512dfb9cfb8888c44373d34354ef8fee41dc2fe9caafb3ff8c932de58f5f5135df0496b76b7fd5ec81c7427e01cd73afbd012e6d8ad6f4cc73bf2d9d2c9526c658e
-
Filesize
1KB
MD5c286f6831ccb441be9a4a7e7e6112e52
SHA1721e723c4a3c386759187b6355f78d3c8da2e3a0
SHA2564fb0f01433a08e3735940e6b12435e5027a86f2b7750b2754cab6685f262e86d
SHA512b3af1dca6f094edb3f35280bcfa4f249a2b7ddb4f2f6f24e207e2e120cb20b18f493a92b22e9470e9f42066331bef8ac09b8e92cf07ef970cf2aee20a1ffa28d
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2