Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 09:39
Behavioral task
behavioral1
Sample
ded9bf868b31a00bb658b44aa70e15b1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ded9bf868b31a00bb658b44aa70e15b1.exe
Resource
win10v2004-20240226-en
General
-
Target
ded9bf868b31a00bb658b44aa70e15b1.exe
-
Size
13KB
-
MD5
ded9bf868b31a00bb658b44aa70e15b1
-
SHA1
a60be4ad196224715219e8d7ff747102b441bed0
-
SHA256
27328041bb85b2e5b2a48743d362663d4907e3a07e7b7a2f3cc72e8a8cfab462
-
SHA512
3f2cfc914f5b7abe2529c35e071da3802d932cbd8289ac298162e8993bfae2dd5640a30ea48245335aba7c1358485aa80100c4bc974e28374f27300648af3cf1
-
SSDEEP
384:Im/3/+W1Y3/P9ixhLcftAmhux4pxOjgAzCEY:Im3FYvPy+H
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4672 docyanxk.exe -
resource yara_rule behavioral2/memory/3480-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/files/0x000200000002289b-5.dat upx behavioral2/memory/3480-8-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4672-10-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\docyanx.dll ded9bf868b31a00bb658b44aa70e15b1.exe File created C:\Windows\SysWOW64\docyanxk.exe ded9bf868b31a00bb658b44aa70e15b1.exe File opened for modification C:\Windows\SysWOW64\docyanxk.exe ded9bf868b31a00bb658b44aa70e15b1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3480 ded9bf868b31a00bb658b44aa70e15b1.exe 3480 ded9bf868b31a00bb658b44aa70e15b1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3480 wrote to memory of 4672 3480 ded9bf868b31a00bb658b44aa70e15b1.exe 90 PID 3480 wrote to memory of 4672 3480 ded9bf868b31a00bb658b44aa70e15b1.exe 90 PID 3480 wrote to memory of 4672 3480 ded9bf868b31a00bb658b44aa70e15b1.exe 90 PID 3480 wrote to memory of 3696 3480 ded9bf868b31a00bb658b44aa70e15b1.exe 91 PID 3480 wrote to memory of 3696 3480 ded9bf868b31a00bb658b44aa70e15b1.exe 91 PID 3480 wrote to memory of 3696 3480 ded9bf868b31a00bb658b44aa70e15b1.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ded9bf868b31a00bb658b44aa70e15b1.exe"C:\Users\Admin\AppData\Local\Temp\ded9bf868b31a00bb658b44aa70e15b1.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\docyanxk.exeC:\Windows\system32\docyanxk.exe ˜‰2⤵
- Executes dropped EXE
PID:4672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\ded9bf868b31a00bb658b44aa70e15b1.exe.bat2⤵PID:3696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5ba16851c2a3f0ae0e3dc4ac6b8b68954
SHA1dd6edc79ff6ef72bc26eca69da3ee079dca91b2e
SHA2564934398aa4af37d0fc3edd3cab4cd99e642d90833325da50777b8163e1c145c9
SHA5125ca87a197cf850d7d9a50d087543b5f5b3e4dbc7c93d285beebca8f6162216fe5e57717782b24bbc6bfc96bd417f032392870b42fece007c6ecee570c62aa81c
-
Filesize
13KB
MD5ded9bf868b31a00bb658b44aa70e15b1
SHA1a60be4ad196224715219e8d7ff747102b441bed0
SHA25627328041bb85b2e5b2a48743d362663d4907e3a07e7b7a2f3cc72e8a8cfab462
SHA5123f2cfc914f5b7abe2529c35e071da3802d932cbd8289ac298162e8993bfae2dd5640a30ea48245335aba7c1358485aa80100c4bc974e28374f27300648af3cf1