Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 20:17
Behavioral task
behavioral1
Sample
c6c540c1ef24bcfbccdac1af1379843f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6c540c1ef24bcfbccdac1af1379843f.exe
Resource
win10v2004-20240226-en
General
-
Target
c6c540c1ef24bcfbccdac1af1379843f.exe
-
Size
13KB
-
MD5
c6c540c1ef24bcfbccdac1af1379843f
-
SHA1
cd1793285f261a2b77bbfb938075e2e4b65398ce
-
SHA256
b5187cd9ef96bf19dac918511ea7f5bc5ba83bbc84693444b9759d74d336799f
-
SHA512
549cac4ba673760def395eae7aefd8f2e425119f4c3e153bdbb5e28c6f6a5a1ca3770094e989d91fa7ccdf0c3845d70f15018aa85135ca5410b54639b06ce569
-
SSDEEP
192:KlJ9vIEDvRyr7+U9p4EnxLnQ8IQPCEMhaTg/3bxPfspinUoUBVI0le6D8ioZ3X:KlJ9PvQBO8Lc2ClhuM3N3sknUPC0gA8
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2088 wonlinsk.exe -
resource yara_rule behavioral2/memory/4636-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/files/0x0005000000022d26-4.dat upx behavioral2/memory/4636-6-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2088-8-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\wonlinsk.exe c6c540c1ef24bcfbccdac1af1379843f.exe File opened for modification C:\Windows\SysWOW64\wonlinsk.exe c6c540c1ef24bcfbccdac1af1379843f.exe File created C:\Windows\SysWOW64\wonlins.dll c6c540c1ef24bcfbccdac1af1379843f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4636 wrote to memory of 2088 4636 c6c540c1ef24bcfbccdac1af1379843f.exe 99 PID 4636 wrote to memory of 2088 4636 c6c540c1ef24bcfbccdac1af1379843f.exe 99 PID 4636 wrote to memory of 2088 4636 c6c540c1ef24bcfbccdac1af1379843f.exe 99 PID 4636 wrote to memory of 3184 4636 c6c540c1ef24bcfbccdac1af1379843f.exe 111 PID 4636 wrote to memory of 3184 4636 c6c540c1ef24bcfbccdac1af1379843f.exe 111 PID 4636 wrote to memory of 3184 4636 c6c540c1ef24bcfbccdac1af1379843f.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6c540c1ef24bcfbccdac1af1379843f.exe"C:\Users\Admin\AppData\Local\Temp\c6c540c1ef24bcfbccdac1af1379843f.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\wonlinsk.exeC:\Windows\system32\wonlinsk.exe ˜‰2⤵
- Executes dropped EXE
PID:2088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\c6c540c1ef24bcfbccdac1af1379843f.exe.bat2⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3792 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:4400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5297c5efb043971c382bc41cd076574a9
SHA15abb11c0d0bbc42866ac726c18b7c231ac64456d
SHA2567bb42ce82dc65dcad1859c7993a3d79d2551ee3c25b124fec920f1be088f0ba4
SHA5125ef35baef5d6574cb60f3d1fc05db407135f5c0aa247d807495832411722c22e5a9f024965107e4a8bdfbddea76953d22265beeeba766703981d8e70063e9b60
-
Filesize
13KB
MD5c6c540c1ef24bcfbccdac1af1379843f
SHA1cd1793285f261a2b77bbfb938075e2e4b65398ce
SHA256b5187cd9ef96bf19dac918511ea7f5bc5ba83bbc84693444b9759d74d336799f
SHA512549cac4ba673760def395eae7aefd8f2e425119f4c3e153bdbb5e28c6f6a5a1ca3770094e989d91fa7ccdf0c3845d70f15018aa85135ca5410b54639b06ce569