Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 23:39
Behavioral task
behavioral1
Sample
d75e46c5b5ea4ea3a2eb2ef69571c777.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d75e46c5b5ea4ea3a2eb2ef69571c777.exe
Resource
win10v2004-20240226-en
General
-
Target
d75e46c5b5ea4ea3a2eb2ef69571c777.exe
-
Size
13KB
-
MD5
d75e46c5b5ea4ea3a2eb2ef69571c777
-
SHA1
9341e1106bc8db36e26eb6e4f11de280ba55062d
-
SHA256
9c4677e9f3ec12b05184ff8b3dcf5d1591579bc940d64191d9e1bda6a5de2a26
-
SHA512
cd691470cce7761869d26df9b95bdeb116fe9bf4475a9c91e754e2303f9f1539f047b0ec43d30cd5c55c6cf52b2f30066c2a94faedb3e6923bb024915f182629
-
SSDEEP
384:BGC7b7P4tezbG3ShKSJ2di7nvm/gPhnQCD/:V7b7P433QYdImIJQC
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2580 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2052 delnicek.exe -
Loads dropped DLL 2 IoCs
pid Process 2408 d75e46c5b5ea4ea3a2eb2ef69571c777.exe 2408 d75e46c5b5ea4ea3a2eb2ef69571c777.exe -
resource yara_rule behavioral1/memory/2408-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/files/0x00040000000130fc-3.dat upx behavioral1/memory/2052-11-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2408-4-0x0000000000230000-0x0000000000240000-memory.dmp upx behavioral1/memory/2408-13-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\delnice.dll d75e46c5b5ea4ea3a2eb2ef69571c777.exe File created C:\Windows\SysWOW64\delnicek.exe d75e46c5b5ea4ea3a2eb2ef69571c777.exe File opened for modification C:\Windows\SysWOW64\delnicek.exe d75e46c5b5ea4ea3a2eb2ef69571c777.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2052 2408 d75e46c5b5ea4ea3a2eb2ef69571c777.exe 28 PID 2408 wrote to memory of 2052 2408 d75e46c5b5ea4ea3a2eb2ef69571c777.exe 28 PID 2408 wrote to memory of 2052 2408 d75e46c5b5ea4ea3a2eb2ef69571c777.exe 28 PID 2408 wrote to memory of 2052 2408 d75e46c5b5ea4ea3a2eb2ef69571c777.exe 28 PID 2408 wrote to memory of 2580 2408 d75e46c5b5ea4ea3a2eb2ef69571c777.exe 29 PID 2408 wrote to memory of 2580 2408 d75e46c5b5ea4ea3a2eb2ef69571c777.exe 29 PID 2408 wrote to memory of 2580 2408 d75e46c5b5ea4ea3a2eb2ef69571c777.exe 29 PID 2408 wrote to memory of 2580 2408 d75e46c5b5ea4ea3a2eb2ef69571c777.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d75e46c5b5ea4ea3a2eb2ef69571c777.exe"C:\Users\Admin\AppData\Local\Temp\d75e46c5b5ea4ea3a2eb2ef69571c777.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\delnicek.exeC:\Windows\system32\delnicek.exe ˜‰2⤵
- Executes dropped EXE
PID:2052
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\d75e46c5b5ea4ea3a2eb2ef69571c777.exe.bat2⤵
- Deletes itself
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD56d184225ef367c42adff82b98984366f
SHA1567e5e14edbc3193b8dd23fa3e35cdf3608537bd
SHA2568f5f642a625bf192038c0e4aa03d8bbee87c85bf5b69f370a862a5c3a71dc8df
SHA512a611a39823095659dbced78b31b10022d3ccc03f59dfffb8f505543f6fe219597eef1bca3419a19b3909abef21d449a4a77d6bc4b65b8e663b83345f30872a0a
-
Filesize
13KB
MD5d75e46c5b5ea4ea3a2eb2ef69571c777
SHA19341e1106bc8db36e26eb6e4f11de280ba55062d
SHA2569c4677e9f3ec12b05184ff8b3dcf5d1591579bc940d64191d9e1bda6a5de2a26
SHA512cd691470cce7761869d26df9b95bdeb116fe9bf4475a9c91e754e2303f9f1539f047b0ec43d30cd5c55c6cf52b2f30066c2a94faedb3e6923bb024915f182629