Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 08:15
Behavioral task
behavioral1
Sample
caeb09f60a374d842038815b9f852563.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
caeb09f60a374d842038815b9f852563.exe
Resource
win10v2004-20240226-en
General
-
Target
caeb09f60a374d842038815b9f852563.exe
-
Size
13KB
-
MD5
caeb09f60a374d842038815b9f852563
-
SHA1
d3b2bbcc70c64a8e4ebf83663dce5f8457d328e8
-
SHA256
5b6e533520b54ffbc22f143217b1e1e29240a21bd972c462d18e533d7bd81b65
-
SHA512
1051de811c760a81f00e1a58210f96d57803641c62b433b5b7394314617804616aadfcb75df39461486e5b7fd4aa1fd167c5722101d22a0ae1cafd0a52cb2b04
-
SSDEEP
192:cqv1LwNY2YjsCcVh9t5tH2XfXkZTxFFVdxnkhHYUMQFmIIMsAqYUDjpci7+4Eg:zv1MNAoCA5t2XAFVdxnq5MrMrWHlSJg
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 3608 biroask.exe -
resource yara_rule behavioral2/memory/4316-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x0003000000022d25-4.dat upx behavioral2/memory/3608-6-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/4316-7-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/3608-8-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\biroas.dll caeb09f60a374d842038815b9f852563.exe File created C:\Windows\SysWOW64\biroask.exe caeb09f60a374d842038815b9f852563.exe File opened for modification C:\Windows\SysWOW64\biroask.exe caeb09f60a374d842038815b9f852563.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4316 caeb09f60a374d842038815b9f852563.exe 4316 caeb09f60a374d842038815b9f852563.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4316 wrote to memory of 3608 4316 caeb09f60a374d842038815b9f852563.exe 99 PID 4316 wrote to memory of 3608 4316 caeb09f60a374d842038815b9f852563.exe 99 PID 4316 wrote to memory of 3608 4316 caeb09f60a374d842038815b9f852563.exe 99 PID 4316 wrote to memory of 4608 4316 caeb09f60a374d842038815b9f852563.exe 108 PID 4316 wrote to memory of 4608 4316 caeb09f60a374d842038815b9f852563.exe 108 PID 4316 wrote to memory of 4608 4316 caeb09f60a374d842038815b9f852563.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\caeb09f60a374d842038815b9f852563.exe"C:\Users\Admin\AppData\Local\Temp\caeb09f60a374d842038815b9f852563.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\biroask.exeC:\Windows\system32\biroask.exe ˜‰2⤵
- Executes dropped EXE
PID:3608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\caeb09f60a374d842038815b9f852563.exe.bat2⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2368 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:4584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5c363f76c2a7c6f88bee78a2137f4a18f
SHA122249030c0e7b8bae7e0926ff42ce5b577ef3939
SHA256168dec7e40e91c6eba5fcdd4c7b4e8f39603e164e679907a432b77a690f24824
SHA512d179807441fabdda814b02d30b0e9c42c6c2182a7799ba9589b749eb7754f1a8c24f9d1d51529f1636afe4b1a820c2fd3af96a7cc24aaa9a354695ba90777347
-
Filesize
13KB
MD5caeb09f60a374d842038815b9f852563
SHA1d3b2bbcc70c64a8e4ebf83663dce5f8457d328e8
SHA2565b6e533520b54ffbc22f143217b1e1e29240a21bd972c462d18e533d7bd81b65
SHA5121051de811c760a81f00e1a58210f96d57803641c62b433b5b7394314617804616aadfcb75df39461486e5b7fd4aa1fd167c5722101d22a0ae1cafd0a52cb2b04