Resubmissions
12/04/2024, 14:24
240412-rq4mhabb49 1012/04/2024, 14:23
240412-rqj8vseb6x 1012/04/2024, 14:23
240412-rqhp2abb46 812/04/2024, 14:23
240412-rqhd9seb6w 812/04/2024, 14:23
240412-rqgsqseb6v 809/04/2024, 07:30
240409-jb97qsch3w 1009/04/2024, 07:30
240409-jb2wcshe88 1009/04/2024, 07:29
240409-jba3mscg9s 1009/04/2024, 07:28
240409-ja2h7she62 729/03/2024, 02:37
240329-c4jf6aga87 9Analysis
-
max time kernel
434s -
max time network
1800s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/04/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe
Resource
win11-20240221-en
General
-
Target
bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe
-
Size
1.9MB
-
MD5
bab406ad3b0603a45625755ffbccce49
-
SHA1
7ce0bd31c68c5b54854098acad195b7a8d804939
-
SHA256
bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8
-
SHA512
a85ca2bc5ab42f8d32856a87c665b66df7d8e1c1ebbb143015d06fcc1bddba1faf684e2ee1d2a572f5ed04edf3a061837c293b5c1e3d2214864b90d8a68d25cc
-
SSDEEP
49152:hgWDef4IXn7EvfNf+x83OeG5ztpAEq2pe2n9SCtQV:hvo49fk83ONztiEqz2nA
Malware Config
Extracted
Protocol: ftp- Host:
sipeges.it - Port:
21 - Username:
[email protected] - Password:
2022M
Extracted
Protocol: ftp- Host:
sipeges.it - Port:
21 - Username:
eventi - Password:
2022M
Signatures
-
resource yara_rule behavioral4/memory/4548-3-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-5-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-6-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-7-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-8-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-9-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-14-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-15-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-16-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-35-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-46-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-50-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-53-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-54-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-58-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-59-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-60-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-61-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-62-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-63-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-64-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-65-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-68-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-73-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-72-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-75-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-79-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-70-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-86-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-94-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-96-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-105-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-104-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-93-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-103-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-88-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-87-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-97-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-89-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-82-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-76-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-81-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-85-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-78-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-69-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-71-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-67-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-98-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-100-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-116-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-107-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-118-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-108-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-120-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-114-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/4548-117-0x0000000000400000-0x0000000000848000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4576 set thread context of 4548 4576 bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe 78 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4548 bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe 4548 bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe 4548 bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe 4548 bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe 4548 bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe 4548 bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4576 wrote to memory of 4548 4576 bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe 78 PID 4576 wrote to memory of 4548 4576 bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe 78 PID 4576 wrote to memory of 4548 4576 bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe 78 PID 4576 wrote to memory of 4548 4576 bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe 78 PID 4576 wrote to memory of 4548 4576 bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe 78 PID 4576 wrote to memory of 4548 4576 bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe 78 PID 4576 wrote to memory of 4548 4576 bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe 78 PID 4576 wrote to memory of 4548 4576 bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe"C:\Users\Admin\AppData\Local\Temp\bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe"C:\Users\Admin\AppData\Local\Temp\bee5a8794014d11323dfb0276e541a0ee9567f61521a1a885ade5ca2d87f36d8.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5ab9edbf2abe36a005b75ed63e6c044f5
SHA1641b5f77d9b0395d87c197a1671f37025410dd06
SHA2566633922a7479ba93178e02f8dde9db0dc50cec012759ea4b66fd5cf5cf92bbad
SHA512d848019b147fbc0709a09c135979df29a339b7c5a84899fa8cba2dc2cf3fbd3e085877f57cbbb20404126c8dae9db061a98316cd2d2248e400e282ec95b4b827
-
Filesize
8.7MB
MD5636c1779d21459cc4e1108cec68e684c
SHA107ef5cefd96895f295aa2dd9d54d6c6373d341a1
SHA256bde81836a209aa5df7844a71cc6c46f587b1b0bbcc06b9ec3092b572f1fa2ea0
SHA512654f3c943b4e01f3abbc40b43cbe0f71074058c9d223376218dfa449b00fc0c28bb446ae5f2f705b90f7a88f4a6b88da1736486a9a43c4ce87e014f958f7088c