Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 01:27
Behavioral task
behavioral1
Sample
c21c377ffd6b6acf50fc1bab98035a42.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c21c377ffd6b6acf50fc1bab98035a42.exe
Resource
win10v2004-20240226-en
General
-
Target
c21c377ffd6b6acf50fc1bab98035a42.exe
-
Size
28KB
-
MD5
c21c377ffd6b6acf50fc1bab98035a42
-
SHA1
4cb9bdeb1bafaec4e33ff1684c922a0d53f0e5e9
-
SHA256
52b27ca757acfedf645f2aaff531d747b57ab1265150a287b78d0f4bef8875df
-
SHA512
c2ecdb1e2d3538643a033b4c291ca28073f28535ff3325af38f3f25faef0b0917e1a8132c2ba1e616a3f42f2f73f39acad5f253fc12061fa438fe9e463a74d67
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNv:Dv8IRRdsxq1DjJcqf4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1840 services.exe -
resource yara_rule behavioral2/memory/1124-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x00080000000231fd-5.dat upx behavioral2/memory/1840-6-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1124-13-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1840-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1840-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1840-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1840-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1840-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1840-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1840-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1840-43-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1840-48-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1124-49-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1840-50-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1124-54-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1840-55-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x00090000000233a7-65.dat upx behavioral2/memory/1124-148-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1840-149-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1124-166-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1840-167-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1840-173-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" c21c377ffd6b6acf50fc1bab98035a42.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe c21c377ffd6b6acf50fc1bab98035a42.exe File opened for modification C:\Windows\java.exe c21c377ffd6b6acf50fc1bab98035a42.exe File created C:\Windows\java.exe c21c377ffd6b6acf50fc1bab98035a42.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1124 wrote to memory of 1840 1124 c21c377ffd6b6acf50fc1bab98035a42.exe 90 PID 1124 wrote to memory of 1840 1124 c21c377ffd6b6acf50fc1bab98035a42.exe 90 PID 1124 wrote to memory of 1840 1124 c21c377ffd6b6acf50fc1bab98035a42.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\c21c377ffd6b6acf50fc1bab98035a42.exe"C:\Users\Admin\AppData\Local\Temp\c21c377ffd6b6acf50fc1bab98035a42.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
28KB
MD5d6cea6b8f10992e004d8371b9c4d3619
SHA1ba6c874da7526056bc25eae943ef622da8e4fd0c
SHA256cc79754404dd175c2e0ceb8a505a31ddaeb079230e71de2d9421010e20bab964
SHA512e85176f2cb5804f3e464962ac9158921d4a450de2db2b7ae314e7e20f95193b023fd38242ea4ef91c4fb3dd0dd3e0e9bfbe93e785afb233c14e90d2a1465198f
-
Filesize
1KB
MD5ba4523d1bf864755a37add528db24b34
SHA19ea4ddac02fb5b80063a43aeebb995d955efdd7b
SHA256fb39572cfa7255eddcad5aa5874b85643a9d87540d6ff36a8c746afda042ee99
SHA5125a9c2eafc25683aa3cad948f7c03447e067f4593a2525a387845e00b50c31b3e3a7435650b7df0fbae18a700e3babb6a5ee990d32a58c5e5aac4ef71b6178804
-
Filesize
1KB
MD5b8f3857a911eb9e50d6151d2f1abd2c7
SHA1311d8a55826eb2fd0b8924099652a6cd3e72e106
SHA256798b02d5ee44bbd451a03c13cb384ad38e8e9884b3c492be589af6de214d3778
SHA51249e70c1989d7eac8be4a212fa86a8a9cd0c1213168194e3c61d45c301b8d67072c18756894f89adb9c96085bb9560644962941f6ca89e469d0963cb61a20ffbe
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2