Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 09:44
Static task
static1
Behavioral task
behavioral1
Sample
c58d5aecd223ac95ae5fab6dcd69e953.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c58d5aecd223ac95ae5fab6dcd69e953.exe
Resource
win10v2004-20240226-en
General
-
Target
c58d5aecd223ac95ae5fab6dcd69e953.exe
-
Size
44KB
-
MD5
c58d5aecd223ac95ae5fab6dcd69e953
-
SHA1
5e51e9c238d652a36666d384e8d7fab2612b3b0e
-
SHA256
5f3c96978d19ec242079f84e9b13498eb9b988262c82a6cdc15ed67276945e5a
-
SHA512
12d4f400da9ffd94cc5cf32d97c443c8839eab936666b1a7832d9507af92d12e4bda5a6d31a13d89ba9bf27642808ab009b9ae52502252c0689b647dc7a386b3
-
SSDEEP
384:VuQiLWpVI/i952Hg2Lx3WCitQO1Px17NYDl75tCfF/8y56WN/79+3sBCoUgFb:kzqE/iyAkx3lGPhsl5sGsN/JCsBCobF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4984 jah.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Help = "C:\\LOL\\jah.exe" c58d5aecd223ac95ae5fab6dcd69e953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Help = "C:\\LOL\\jah.exe" jah.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4772 wrote to memory of 3700 4772 c58d5aecd223ac95ae5fab6dcd69e953.exe 88 PID 4772 wrote to memory of 3700 4772 c58d5aecd223ac95ae5fab6dcd69e953.exe 88 PID 4772 wrote to memory of 3700 4772 c58d5aecd223ac95ae5fab6dcd69e953.exe 88 PID 4772 wrote to memory of 5008 4772 c58d5aecd223ac95ae5fab6dcd69e953.exe 92 PID 4772 wrote to memory of 5008 4772 c58d5aecd223ac95ae5fab6dcd69e953.exe 92 PID 4772 wrote to memory of 5008 4772 c58d5aecd223ac95ae5fab6dcd69e953.exe 92 PID 5008 wrote to memory of 4984 5008 cmd.exe 94 PID 5008 wrote to memory of 4984 5008 cmd.exe 94 PID 5008 wrote to memory of 4984 5008 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\c58d5aecd223ac95ae5fab6dcd69e953.exe"C:\Users\Admin\AppData\Local\Temp\c58d5aecd223ac95ae5fab6dcd69e953.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\KKLJN.bat2⤵PID:3700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\BHMKP.bat2⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\LOL\jah.exe"C:\LOL\jah.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4984
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD565e1b02a23cab785ab4b9d74d45d432e
SHA10ea815d5c7042cc36f188645a0cb4614c0bbafa7
SHA256b79ab35ba85e813bb8a9d36534b53fdbf66150d912d0b514d42343825ceff39e
SHA5120d1c12bde6d7257876ea25957b930360c8b6c62dd4d449916e663166b74c7364efedea741afdf9dba613150338449895b11448724c700266e60ef9266dd39c83
-
Filesize
94B
MD542a4b81afccb672a4449bf7150831bc2
SHA1409c6d8dbe76ab1eaff02f0f59a21713350ccb79
SHA256d4dc632a5fa8e2a4c524173ae06a3c297cfd88421f768629ced4bc1c9aedaa23
SHA512a9b16daa9c383cbb8cb94d64a7aad84ce72d7f4ffaf56d85754a76731b49fde37d4ae374364c636ca85599a2731827104e1c0cf4230d447f870f011803faeb1e
-
Filesize
44KB
MD5c58d5aecd223ac95ae5fab6dcd69e953
SHA15e51e9c238d652a36666d384e8d7fab2612b3b0e
SHA2565f3c96978d19ec242079f84e9b13498eb9b988262c82a6cdc15ed67276945e5a
SHA51212d4f400da9ffd94cc5cf32d97c443c8839eab936666b1a7832d9507af92d12e4bda5a6d31a13d89ba9bf27642808ab009b9ae52502252c0689b647dc7a386b3