Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 20:59
Behavioral task
behavioral1
Sample
d719e269caa5c608065c54bf3ddb2bb7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d719e269caa5c608065c54bf3ddb2bb7.exe
Resource
win10v2004-20231215-en
General
-
Target
d719e269caa5c608065c54bf3ddb2bb7.exe
-
Size
11KB
-
MD5
d719e269caa5c608065c54bf3ddb2bb7
-
SHA1
00398791913faa40c657ee49f86f81af69ffa6a8
-
SHA256
d6cc72d5446a03b3590dbc515e2b97de768d61d32bb82c3e1e742c832f6ddc20
-
SHA512
fac0d6019f26ab8ad517d283700e0d4c6d91ae5e9a21010a5da66923da08fe474a413348811fe9910339de2a3d517f5139930aa9af569908293ce3bab7555311
-
SSDEEP
192:2jhkFN9GFwR0EgubNCrJ4aNErOSQHxEF6zPEZ5sv6Lnn25dJcp:ghknQ8gyNCKaNEqxEeE5Tn25G
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 876 cmbdafk.exe -
resource yara_rule behavioral2/memory/3880-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x00060000000231fa-4.dat upx behavioral2/memory/3880-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/876-7-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\cmbdaf.dll d719e269caa5c608065c54bf3ddb2bb7.exe File created C:\Windows\SysWOW64\cmbdafk.exe d719e269caa5c608065c54bf3ddb2bb7.exe File opened for modification C:\Windows\SysWOW64\cmbdafk.exe d719e269caa5c608065c54bf3ddb2bb7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3880 wrote to memory of 876 3880 d719e269caa5c608065c54bf3ddb2bb7.exe 83 PID 3880 wrote to memory of 876 3880 d719e269caa5c608065c54bf3ddb2bb7.exe 83 PID 3880 wrote to memory of 876 3880 d719e269caa5c608065c54bf3ddb2bb7.exe 83 PID 3880 wrote to memory of 5052 3880 d719e269caa5c608065c54bf3ddb2bb7.exe 92 PID 3880 wrote to memory of 5052 3880 d719e269caa5c608065c54bf3ddb2bb7.exe 92 PID 3880 wrote to memory of 5052 3880 d719e269caa5c608065c54bf3ddb2bb7.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d719e269caa5c608065c54bf3ddb2bb7.exe"C:\Users\Admin\AppData\Local\Temp\d719e269caa5c608065c54bf3ddb2bb7.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\cmbdafk.exeC:\Windows\system32\cmbdafk.exe ˜‰2⤵
- Executes dropped EXE
PID:876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\d719e269caa5c608065c54bf3ddb2bb7.exe.bat2⤵PID:5052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD56d2f3bb838c57f9f1d536d4527f298b3
SHA152675793048c10d2b54f843164d3509905cd226d
SHA2560c741980ebd80ff5048019d7e011b07cc12c31905ef5257412d9983804ee10a6
SHA51207cbea477a60bf2f95e8a60d9fbe6f16d93955818b689cddccf3729236945117dd8758543d284077e3a6cc8e327ff90b15e717387857d0df1957da9585f7b00b
-
Filesize
11KB
MD5d719e269caa5c608065c54bf3ddb2bb7
SHA100398791913faa40c657ee49f86f81af69ffa6a8
SHA256d6cc72d5446a03b3590dbc515e2b97de768d61d32bb82c3e1e742c832f6ddc20
SHA512fac0d6019f26ab8ad517d283700e0d4c6d91ae5e9a21010a5da66923da08fe474a413348811fe9910339de2a3d517f5139930aa9af569908293ce3bab7555311