Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 09:15
Behavioral task
behavioral1
Sample
dece8e327ece0f240afdbcef1456345b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
dece8e327ece0f240afdbcef1456345b.exe
Resource
win10v2004-20240226-en
General
-
Target
dece8e327ece0f240afdbcef1456345b.exe
-
Size
16KB
-
MD5
dece8e327ece0f240afdbcef1456345b
-
SHA1
0e6c07f684c83120d150c1a72fb46a71b0f90e55
-
SHA256
86c989534785cd8af2b858d14d551784abf32a1f91ad9b9fbf43da67f7329ca5
-
SHA512
06fea16c324e13d22daeb3c270bb16d0dfe9392c5fd1d819e259f466530030c09e2fe31ac1087a012fd1b4b315d4dfbb34bd453ebd3594830308f17ec61c59e6
-
SSDEEP
384:j7Ho1zZtx6RxPQNZ8uPClPMHGdRyfl+CN72mTH3Q4:cdtuHTYGdRyfQk71TXR
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Drivers\beep.sys dece8e327ece0f240afdbcef1456345b.exe File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys dece8e327ece0f240afdbcef1456345b.exe -
Executes dropped EXE 1 IoCs
pid Process 1948 MyLoverMain.exe -
Loads dropped DLL 2 IoCs
pid Process 3632 dece8e327ece0f240afdbcef1456345b.exe 1948 MyLoverMain.exe -
resource yara_rule behavioral2/memory/3632-0-0x0000000000160000-0x000000000016B000-memory.dmp upx behavioral2/memory/3632-14-0x0000000000160000-0x000000000016B000-memory.dmp upx behavioral2/files/0x000d0000000231b1-15.dat upx behavioral2/memory/1948-25-0x0000000000160000-0x000000000016B000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\me.bat dece8e327ece0f240afdbcef1456345b.exe File opened for modification C:\Windows\SysWOW64\me.bat attrib.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\MyLover\kaka.bat dece8e327ece0f240afdbcef1456345b.exe File created C:\Windows\MyLover\MyLoverDll.dat MyLoverMain.exe File opened for modification C:\Windows\MyLover\MyLoverSYS.dat MyLoverMain.exe File opened for modification C:\Windows\MyLover\MyLoverDll.dat MyLoverMain.exe File created C:\Windows\MyLover\MyLoverDll.dat dece8e327ece0f240afdbcef1456345b.exe File created C:\Windows\MyLover\MyLoverSYS.dat dece8e327ece0f240afdbcef1456345b.exe File opened for modification C:\Windows\MyLover\MyLoverDll.dat dece8e327ece0f240afdbcef1456345b.exe File opened for modification C:\Windows\MyLover\MyLoverSYS.dat dece8e327ece0f240afdbcef1456345b.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 1948 MyLoverMain.exe 1948 MyLoverMain.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 1948 MyLoverMain.exe 1948 MyLoverMain.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 1948 MyLoverMain.exe 1948 MyLoverMain.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 1948 MyLoverMain.exe 1948 MyLoverMain.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 1948 MyLoverMain.exe 1948 MyLoverMain.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 1948 MyLoverMain.exe 1948 MyLoverMain.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 1948 MyLoverMain.exe 1948 MyLoverMain.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 1948 MyLoverMain.exe 1948 MyLoverMain.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 1948 MyLoverMain.exe 1948 MyLoverMain.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 1948 MyLoverMain.exe 1948 MyLoverMain.exe 3632 dece8e327ece0f240afdbcef1456345b.exe 3632 dece8e327ece0f240afdbcef1456345b.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3632 dece8e327ece0f240afdbcef1456345b.exe Token: SeDebugPrivilege 1948 MyLoverMain.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3632 wrote to memory of 2800 3632 dece8e327ece0f240afdbcef1456345b.exe 89 PID 3632 wrote to memory of 2800 3632 dece8e327ece0f240afdbcef1456345b.exe 89 PID 3632 wrote to memory of 2800 3632 dece8e327ece0f240afdbcef1456345b.exe 89 PID 2800 wrote to memory of 3420 2800 NET.exe 91 PID 2800 wrote to memory of 3420 2800 NET.exe 91 PID 2800 wrote to memory of 3420 2800 NET.exe 91 PID 3632 wrote to memory of 2076 3632 dece8e327ece0f240afdbcef1456345b.exe 96 PID 3632 wrote to memory of 2076 3632 dece8e327ece0f240afdbcef1456345b.exe 96 PID 3632 wrote to memory of 2076 3632 dece8e327ece0f240afdbcef1456345b.exe 96 PID 2076 wrote to memory of 4848 2076 NET.exe 98 PID 2076 wrote to memory of 4848 2076 NET.exe 98 PID 2076 wrote to memory of 4848 2076 NET.exe 98 PID 3632 wrote to memory of 4856 3632 dece8e327ece0f240afdbcef1456345b.exe 100 PID 3632 wrote to memory of 4856 3632 dece8e327ece0f240afdbcef1456345b.exe 100 PID 3632 wrote to memory of 4856 3632 dece8e327ece0f240afdbcef1456345b.exe 100 PID 1948 wrote to memory of 800 1948 MyLoverMain.exe 10 PID 4856 wrote to memory of 4892 4856 cmd.exe 102 PID 4856 wrote to memory of 4892 4856 cmd.exe 102 PID 4856 wrote to memory of 4892 4856 cmd.exe 102 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4892 attrib.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\dece8e327ece0f240afdbcef1456345b.exe"C:\Users\Admin\AppData\Local\Temp\dece8e327ece0f240afdbcef1456345b.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\NET.exeNET STOP Beep2⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP Beep3⤵PID:3420
-
-
-
C:\Windows\SysWOW64\NET.exeNET START Beep2⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 START Beep3⤵PID:4848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\me.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a C:\Windows\system32\me.bat3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:4892
-
-
-
C:\Windows\MyLover\MyLoverMain.exeC:\Windows\MyLover\MyLoverMain.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5f502f7533e37157b70d6871ef93bc65d
SHA1a2b7b7cefa310c41018371147ba64c2deb53e0c3
SHA25655c96bbe5490b47a82b7dda9dd751c137fec4aa39dbd5ec01c29c5ca1685019c
SHA512272872e7022cfba8448a0cbaef5473db3d949c2eeff0521c870045190f12f8641b37bae26170916eb117887f15f4c169fc0e1c7443e1a58db6203fb44a3bc24a
-
Filesize
16KB
MD5dece8e327ece0f240afdbcef1456345b
SHA10e6c07f684c83120d150c1a72fb46a71b0f90e55
SHA25686c989534785cd8af2b858d14d551784abf32a1f91ad9b9fbf43da67f7329ca5
SHA51206fea16c324e13d22daeb3c270bb16d0dfe9392c5fd1d819e259f466530030c09e2fe31ac1087a012fd1b4b315d4dfbb34bd453ebd3594830308f17ec61c59e6
-
Filesize
4KB
MD53bbf4bbec9e7720a9a53c8911dfa3aab
SHA1f50695daf4f0b366b12e9c065519295d03cf6d3f
SHA256c0bed2920e25a28af51029d5deaafff82d0955f8bd8e7ea21d2bdbd3e177c7c0
SHA512b9263452daa0247d8c9f75cdc1b837a56d526804d9c559e2790c78371307f9e3d0ec9a584d8463acd02d57ce75f523e3c2e4dab2a4d4e2ed0e0ddd22d335fb36
-
Filesize
137B
MD52c06333ff38c1cca43b237f546175998
SHA15b1b7f92456c9bf0f4735c83530e2a429b76fa9f
SHA2562482121585fb9056190d3a3b274b1061a92877738ce82425fbde8464c4009a99
SHA5122c93520b49d5c8fdf0f9c34135d0ba6a7d3538209af1c33fe9400712c2dc106e68ad724734d7a60adf0210bf1649cee471536b4bac25cd73ad8efaafed91593f