Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
Rockstar_method_2.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Rockstar_method_2.rar
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Log checker.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
Log checker.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
deliveredGoods (2).txt
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
deliveredGoods (2).txt
Resource
win10v2004-20240508-en
General
-
Target
Log checker.exe
-
Size
16.0MB
-
MD5
7bbfb8d2359f13dab444803e9a0fd5e0
-
SHA1
bd5896b6d3e1576567db303de9c1d6ae35a86b2d
-
SHA256
9855b51749951297120268dcef92442bddc39c8374c2e8edbe4e80fcddc09966
-
SHA512
150d66304c01d000d74f550c34ba475422a028171df160962faa60391b49d59a39533aeb9a4affc4de44f3a1f2ba0e622cf1d1e92d0b6dc72c47179b387a568c
-
SSDEEP
393216:zlPiKyPxsHjFofQo5xHSdX30GVrSVSJ3QJIIg++462:zlKlZ6mYsx0rVrdJ3qgw62
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2924 creal.exe 1488 creal.exe 1088 Process not Found -
Loads dropped DLL 4 IoCs
pid Process 1876 Log checker.exe 2924 creal.exe 1488 creal.exe 1088 Process not Found -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral3/files/0x00080000000122bf-5.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2924 1876 Log checker.exe 28 PID 1876 wrote to memory of 2924 1876 Log checker.exe 28 PID 1876 wrote to memory of 2924 1876 Log checker.exe 28 PID 2924 wrote to memory of 1488 2924 creal.exe 29 PID 2924 wrote to memory of 1488 2924 creal.exe 29 PID 2924 wrote to memory of 1488 2924 creal.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Log checker.exe"C:\Users\Admin\AppData\Local\Temp\Log checker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\creal.exe"C:\Users\Admin\AppData\Local\Temp\creal.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\creal.exe"C:\Users\Admin\AppData\Local\Temp\creal.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD53c388ce47c0d9117d2a50b3fa5ac981d
SHA1038484ff7460d03d1d36c23f0de4874cbaea2c48
SHA256c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb
SHA512e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35
-
Filesize
16.2MB
MD5f1ff8286a79c2448162494964947121a
SHA1351ee4e12a653277c3ab9bbd0298d07995b4fe9e
SHA2560fe01e43fa1cf10cd81ae3502bfae0f18935787f2b43c9a40f76d896c3384f55
SHA512dbb80fc9fe67ae7bd0c0fc23ae7af042810d8f7fa0e0c7fa379aa7a37d45c80f1d58fd4500c955d2b33278b90c60685b175ed5eb70063e2534051e5ad2a6d3e5