Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe
Resource
win10v2004-20240226-en
General
-
Target
b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe
-
Size
404KB
-
MD5
5ebff7118cf6779dd5848202d2f6ad0e
-
SHA1
1c61d610c6e70111429cb5320516a8fdafc0e212
-
SHA256
b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a
-
SHA512
a754a17a64322d26ab22ddf6875c5586b86f254fbd59808baeae654627042b83dcb5b94a9f3c9ca9784b2fd99773b383ebb5b5e7f0f6b598240acf774e14957e
-
SSDEEP
6144:Cck18MipfIUaQYu8tbS6JBcj0U5hjX/Tvf8MJYFW8jb/HVbdsifRe9+fHrGJS:CX8Djadu8J4YSjX/THmxr1bBGsHrGJS
Malware Config
Signatures
-
Detects executables packed with aPLib. 3 IoCs
resource yara_rule behavioral1/memory/2316-0-0x0000000000400000-0x0000000000479000-memory.dmp INDICATOR_EXE_Packed_aPLib behavioral1/memory/2316-1-0x0000000000400000-0x0000000000479000-memory.dmp INDICATOR_EXE_Packed_aPLib behavioral1/memory/2316-58-0x0000000000400000-0x0000000000479000-memory.dmp INDICATOR_EXE_Packed_aPLib -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2316 set thread context of 2740 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2740 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 28 PID 2316 wrote to memory of 2740 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 28 PID 2316 wrote to memory of 2740 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 28 PID 2316 wrote to memory of 2740 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 28 PID 2316 wrote to memory of 2740 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 28 PID 2316 wrote to memory of 2740 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 28 PID 2316 wrote to memory of 2740 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 28 PID 2316 wrote to memory of 2740 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 28 PID 2316 wrote to memory of 2740 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 28 PID 2316 wrote to memory of 2740 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 28 PID 2316 wrote to memory of 2740 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 28 PID 2316 wrote to memory of 2740 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 28 PID 2316 wrote to memory of 2600 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 29 PID 2316 wrote to memory of 2600 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 29 PID 2316 wrote to memory of 2600 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 29 PID 2316 wrote to memory of 2600 2316 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe"C:\Users\Admin\AppData\Local\Temp\b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\svchost.exeC:\ProgramData\d2j26hh6b4.exe2⤵PID:2740
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\xcu9285.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe""2⤵PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD541ef93c0898d96d307d80a2fdc602949
SHA1b3ef650ae32cb421c5f104d3abffbf6e782e57d1
SHA2566663e6b954abaf00e7a8773e7a3da90aca510eba974a28a17759f01c5be5f890
SHA512727475cb13df33b2a1e5fd3a20ad6d9ff114b91cf42ea3d442879754dfc6b63ebf3753931af84004937832f5d9a90d5a95619dfe3bc41a7b99b90db123f0a9b1