Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 11:07
Behavioral task
behavioral1
Sample
c878362fcdc7b9ecc1e03207f2d27e71.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c878362fcdc7b9ecc1e03207f2d27e71.exe
Resource
win10v2004-20240226-en
General
-
Target
c878362fcdc7b9ecc1e03207f2d27e71.exe
-
Size
11KB
-
MD5
c878362fcdc7b9ecc1e03207f2d27e71
-
SHA1
d0e14be590be6428fbea76144a0201eff7bd2b17
-
SHA256
0e84afcd788a721f9584597013f6e7c634baafa7dc0e37bee766f7f00083d817
-
SHA512
b4449d0e5b62fe4ecb02801f74fcf9d14758fb493043a26e03a63726d0c47c19eae3542dcfc9dc8ef04626eb2b0b977d6cc14818b06bb18442480ddf24b494d3
-
SSDEEP
192:GjhkFN9teAqlkuxdchqAr+X71vaAXvZgqXYMn3A7VbrE10cp:whknrHikuQe71vfCqXYMnQ7VbgT
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 1312 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2028 cmonosk.exe -
Loads dropped DLL 2 IoCs
pid Process 2208 c878362fcdc7b9ecc1e03207f2d27e71.exe 2208 c878362fcdc7b9ecc1e03207f2d27e71.exe -
resource yara_rule behavioral1/memory/2208-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000b00000001565d-3.dat upx behavioral1/memory/2028-11-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2208-12-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\cmonosk.exe c878362fcdc7b9ecc1e03207f2d27e71.exe File opened for modification C:\Windows\SysWOW64\cmonosk.exe c878362fcdc7b9ecc1e03207f2d27e71.exe File created C:\Windows\SysWOW64\cmonos.dll c878362fcdc7b9ecc1e03207f2d27e71.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2028 2208 c878362fcdc7b9ecc1e03207f2d27e71.exe 28 PID 2208 wrote to memory of 2028 2208 c878362fcdc7b9ecc1e03207f2d27e71.exe 28 PID 2208 wrote to memory of 2028 2208 c878362fcdc7b9ecc1e03207f2d27e71.exe 28 PID 2208 wrote to memory of 2028 2208 c878362fcdc7b9ecc1e03207f2d27e71.exe 28 PID 2208 wrote to memory of 1312 2208 c878362fcdc7b9ecc1e03207f2d27e71.exe 29 PID 2208 wrote to memory of 1312 2208 c878362fcdc7b9ecc1e03207f2d27e71.exe 29 PID 2208 wrote to memory of 1312 2208 c878362fcdc7b9ecc1e03207f2d27e71.exe 29 PID 2208 wrote to memory of 1312 2208 c878362fcdc7b9ecc1e03207f2d27e71.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c878362fcdc7b9ecc1e03207f2d27e71.exe"C:\Users\Admin\AppData\Local\Temp\c878362fcdc7b9ecc1e03207f2d27e71.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmonosk.exeC:\Windows\system32\cmonosk.exe ˜‰2⤵
- Executes dropped EXE
PID:2028
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\c878362fcdc7b9ecc1e03207f2d27e71.exe.bat2⤵
- Deletes itself
PID:1312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD561beee8b91cd28777d26e04eb2eb7ef7
SHA10296d00dc451a2eba5c0c1e6257d166791e22ad4
SHA256339c7c5c37a2bdfc1a8e4a054b7b0f65e075fe39233c0dde9df98c8d6a473595
SHA512db2b1e0f055711cf30d294b35580aa36b0ca1a0f608e81ab0fd573786c0d69ed049ad7ffe0ce88e66882d9fc6d48c356f87a28e2d1d5146ef6b6e5e028495105
-
Filesize
11KB
MD5c878362fcdc7b9ecc1e03207f2d27e71
SHA1d0e14be590be6428fbea76144a0201eff7bd2b17
SHA2560e84afcd788a721f9584597013f6e7c634baafa7dc0e37bee766f7f00083d817
SHA512b4449d0e5b62fe4ecb02801f74fcf9d14758fb493043a26e03a63726d0c47c19eae3542dcfc9dc8ef04626eb2b0b977d6cc14818b06bb18442480ddf24b494d3