Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 21:53
Behavioral task
behavioral1
Sample
57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5.exe
Resource
win10v2004-20240508-en
General
-
Target
57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5.exe
-
Size
29KB
-
MD5
6ae43bb525fa22668ad44aa50af5ed79
-
SHA1
d0969ec006e281ba370d3f1915ac7394683f8a8a
-
SHA256
57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5
-
SHA512
7e0e7b3f7eec6f70bc994c6be78b66a30511c11f567d800426fef661ab53299ea2f75dd9e6db81b373d4df316eabc5c6d56934375af97d04fea78dce9eb0bf84
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/y:AEwVs+0jNDY1qi/q6
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Executes dropped EXE 1 IoCs
pid Process 940 services.exe -
resource yara_rule behavioral2/memory/4676-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x00070000000233c7-4.dat upx behavioral2/memory/940-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4676-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/940-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/940-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/940-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/940-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/940-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4676-35-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/940-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x00090000000233db-46.dat upx behavioral2/memory/4676-97-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/940-98-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4676-267-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/940-268-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4676-294-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/940-295-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/940-297-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4676-301-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/940-302-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4676-484-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/940-485-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4676-639-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/940-640-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4676-763-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/940-764-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5.exe File opened for modification C:\Windows\java.exe 57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5.exe File created C:\Windows\java.exe 57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4676 wrote to memory of 940 4676 57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5.exe 82 PID 4676 wrote to memory of 940 4676 57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5.exe 82 PID 4676 wrote to memory of 940 4676 57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5.exe"C:\Users\Admin\AppData\Local\Temp\57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD51835008f33fce65ca57a5efa12ea4229
SHA18004d2cee613dde1cb841652310a3e693ec0fda2
SHA25625028b2e76f2b22c98f3c4fa0bfb16ee542da2d5eb325880384cc356ace249e9
SHA512eaf46fe12c6bb14f5246e0bc0c8649a22b02de10355c7a369fe75e8e04ebc4ef2a7d336b79c0799e3521899cdd302b4e7cb8da09d03e94dcdda0ae883c9d2eee
-
Filesize
114KB
MD5ec86e189c305d7d0b625090a79e78827
SHA1ad6eb4abb74cd063bedb9ff581683a9c18b8b995
SHA256163ae02910eaa8be22b21937ae688e0d3b55bdeac031a3107b97ec2698c0fd9b
SHA512bbb397c4a4efe7207b8fbfa802b7b8f14710c0e4e42137ec49669520d225e5201ec276950e3bf3c6103a8dc7ec3db5b28df01cb6ef25ff39f289bf8fdef09351
-
Filesize
109KB
MD5cadfbef3c42f4b4c5e9eef60b84ce5f1
SHA1d6ef49f3ed65335fc9f28f0dcf42d138c5df159c
SHA256a64ccd3929e0bddaa2bd4737e921ad2c4cd2a92eaa2f0a0b1defea49d44048ac
SHA512b29d36ac65a837ef593ac4e09644001272ce3d59612f2099a902ab43fe2be44b399591567fd110fd68ad7c99f9a855517bb80850a3acf042a1170c7a4dab17ab
-
Filesize
133KB
MD5778d66cf09b1270b1f09e921f67f3735
SHA16e39723f551846bf6a52a1df28cb510bae76090a
SHA256e987e8748921d0b115d032235a2917f558627d6202e22d800f7cf9b106e3a8b1
SHA512c4995cc06b4308c9e1f78ddc69e9b85c6ac3747be9164d06aad0db0f82211cc6a5aa1fdd8804365b270b061fff44ff23967431100bae505e82959e19068971f3
-
Filesize
145KB
MD5cfa8ea4da20fb185789c4b3fb23bbb10
SHA1a7652f8f935469afdf1819f50681a570f1a538b6
SHA256858300b3cbf2021fcbb027884446c1a921660461aed29215c4f5980bced9d895
SHA5120140064fd7382bcece79ae8476f1b0ff72b7361410af0dfe073316c832275ed3f87435e911be61230c20fdd4de414479cff605e3140ac8d2b6277a644689ccb7
-
Filesize
159KB
MD5062ab212ff0995c0ffd3151aea0e7d13
SHA1bbd68fe1a83012813c942768356c55130a0cb4da
SHA2565d97c4072ce4daf4c0b8f593e8ac575005e135b98d0e068b005447bde1f1637a
SHA512f3c2a9bbb01adf5e17c37bc4356a30c636f17157c7e6233a9e7c27554f8fa8ebd0f99dfac85027c28c96f973d9dbb68d65727726fd79950425d537aae4f27f06
-
Filesize
153KB
MD5583616530cd6aca2dff3cfa4f4ca81a5
SHA16be46f018e9d9eabf039639ae4e1cce5fa1eca36
SHA2568916a177a8b1cbee4c078e4ccb275904615fa79ed236e9558979a4fe733ddccc
SHA5125f407be4ff155f35883064237e75030072f27142be6dc03de66e5b9a18f68ba7ab223526af08d71782e63eed52b2b27786b9ddf4cd9b6fec497e1ba4cac324e7
-
Filesize
312B
MD5c15952329e9cd008b41f979b6c76b9a2
SHA153c58cc742b5a0273df8d01ba2779a979c1ff967
SHA2565d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA5126aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296
-
Filesize
1KB
MD5211da0345fa466aa8dbde830c83c19f8
SHA1779ece4d54a099274b2814a9780000ba49af1b81
SHA256aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5
SHA51237fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca
-
Filesize
1KB
MD5ee4aed56584bf64c08683064e422b722
SHA145e5ba33f57c6848e84b66e7e856a6b60af6c4a8
SHA256a4e6ba8c1fe3df423e6f17fcbeeaa7e90e2bd2fffe8f98ff4b3e6ed970e32c61
SHA512058f023cb934a00c8f1c689001438c9bdd067d923ddcbe7a951f54d3ca82218803e0e81fbc9af5c56375ff7961deed0359af1ffa7335d41379ee97d01a76ded6
-
Filesize
119KB
MD582ab0940742c1cdb070cdb28376c1517
SHA134e2b2856e3941c26eb06ce24d9fb93a50962367
SHA256b0a00fa9cec846801c18db0e17dfdef848cd457da82cd584bd981220137a0aed
SHA512e6aed2362cf1882c3dc943857dce4b620a0c3978698b1ed1b82ba16b0434e8a0d8a7e7d90faa4426044691bddaa2c3da08ef2eaec4b86b39cc48e3f7d5a9c9c7
-
Filesize
112KB
MD55047adb5f85ab566e2ecb707b9d378e3
SHA1bf5194450816c5b2387f9875829f0f0e267724db
SHA2566360b634c181bbe29af3a770bccfdd064b4cd139952eeeba7fdb4e8010060728
SHA51286d92328baafb8d019401d02205dae5a59516e40a947724f06a04f21017fea431d4c12c026e94f09c5090ac710ed5e8efb964e7f4adc3f203c517cba9ec0c645
-
Filesize
109KB
MD5b650c2397f5a7d89e642767ebdd83573
SHA197fc8a9c84b1ed652703c52786e808f1b83df2fa
SHA2560cdb5fe17f6cf626e2c3fc342acf15d0538bfc20181096a20194455a8669dab2
SHA512ede7c05169b82112c0a9b9e0b4ec2fdebaec375839161f6a439112564097cdf5e4f0c4d7787e831a61a30b5538c2027a17d16bf2029add268f37c3c3d4e31292
-
Filesize
130KB
MD50160fb71b4f968e3434731356a412e5f
SHA1e5da6c1c52ca30c81f41f992ed49e0e53f171a1e
SHA25617a561509489cdd29da37c6583c7063b21832c723a4c92ece4e5a5b390ff9c9d
SHA5126dd117da5f4aa15f22ea80b0f025c5efee0eec64680094e2d45c3d16cefa0306a52daad19ae7ca3fe8457cdcf5507535e0cb7bf506fcddea40f223e2c1579af8
-
Filesize
1KB
MD535a826c9d92a048812533924ecc2d036
SHA1cc2d0c7849ea5f36532958d31a823e95de787d93
SHA2560731a24ba3c569a734d2e8a74f9786c4b09c42af70457b185c56f147792168ea
SHA512fd385904a466768357de812d0474e34a0b5f089f1de1e46bd032d889b28f10db84c869f5e81a0e2f1c8ffdd8a110e0736a7d63c887d76de6f0a5fd30bb8ebecd
-
Filesize
119KB
MD50ae4390afd4946f947fb2896b1ecd82c
SHA141098b24b65690804a542171e21212ec25893e3b
SHA25656f76a89c34fe80a1c3c962a10b480eb79a05744bc28cef2e84c489fe899874c
SHA5127003444c2f75a0c4950b4dde61f75ff0145b6e8892bd63f109305cd0c64d11b59bb6dada931c3ed7205a71885336ba3f6927d6e2af06eef0ef943c1380f99162
-
Filesize
157KB
MD5bd278284d887945f35970a0451fb7956
SHA1943c196d22615489fa06290aadfe79806c9b9160
SHA256093b01e696f164ca0f8307764b55ec5b311c7e9e8a8c57865ef307f21f4625a1
SHA512a674e8c108d26c287190efbbdc474783cdefe7204bbafbd5be88b44fc9d59ae895ad45359d3d85248165b98ae5cbb20f6d836507d4c89da1867c596076c97062
-
Filesize
167KB
MD50329baa829aa624d53396b3b8e97d77f
SHA1cf4bc2fae8ed96fed1b33a802605a5cf29d9a721
SHA256517f6fc50cfb474564e5ac9fbfae23ff15205bf301457a4f43782bf3ca40a3b8
SHA5123c86f534ee7cc40dbebd892cc11416e766fb193dbce0de84bf7e912bd7f4ecc072afc8e833d3e583e2b67790a867a1c4f2ad33d088c7fcf050f28b3ce58b453f
-
Filesize
136KB
MD5862c213fa28781997126ba26a2571d6f
SHA1f4e7db93ddf0a0d6e972013cd6d6c2f7014efaa7
SHA2567a5bb81277c4136f1f1a68510dce9ff2b414c4fdb9cfb200b694d5a800194d52
SHA512c20c71997117b32669419e1e09ef3a6e5182616118103778eb0877c74fcb6e7086228bb2c5e927164ed174494bb56b056a5ccc2fb6ee36a9c85f837a1349b862
-
Filesize
141KB
MD52dd541ab49c24746de3866210dfa7e04
SHA15f53d30fe22cd9f4cd1007ed9eb3c5df87a7799d
SHA25698e44643d1461028c08a1948074a98ca2dc95a24708e61fbd00d2038948ea018
SHA512539a8a30f3efb0d2360e33f4a8aed605d64ee9f05f5ec330888e4991cf6b96c2082458408d96fa8afdb22eafa2bc67bc6a7b47e39b07a055df15c05b9a38cf8d
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
29KB
MD529a75815e729e653bccebf07166700d8
SHA1fbb86bf48e0c30af38ea8a606a0a077c92c7cff6
SHA256ee530517b57a9d5fa8ad788ef74e223cd43536fafb9284c1b3fa12990c87b1ea
SHA512d52320b89ec662bc821ec56094c4f48f23d76e561c89ddb172a8080015a6ab01c59071069540ca9b0a35a0dcd61bf28142c39de20651b1b683bde627178ba25e
-
Filesize
320B
MD52b32c7b39de9278489dafe382c521155
SHA17a58411d5c9fbcf304fa9078fea450fa66ca8a0d
SHA256bcfff6cdc8b65edc2af4efc3f4fd52de114c736d3c59ba6cc2fe4d15b8be1657
SHA51214f0d55f0506ff17b76bea33de74a4a298083a19d701ed6c8d0dbafba3f574dca8833eab981d375dd347d51eb4a145ba5456ab6e33694f194838ad0c2b6ea48b
-
Filesize
320B
MD5ed1097801ff3e383ccb8b1080206b8a1
SHA13c3ab8155382947f8acf8e95648bcfdb574d86c8
SHA2562780e001108600992f06c08061945e2f56d4a6fdd310f076fad3aee414dcb88c
SHA5123168b8c69b9938063eaca3ba5103b6e20510d6e3ada26482fde567382d8aea91ba05b1951028cf502f23e20aa99ab7ccc33dc2b7d4b3b2c0e2e0105c7c29d55c
-
Filesize
320B
MD554855f56b9083193c0b45b929738815c
SHA1c438c844056449360e5dacc0c912c054906bdeae
SHA25610d03df61b11f75537a7aeafb24bbe60240f28e121736423656ae29b97945ac7
SHA512b1b95003e9cf56b586b3124605d1018a0f6077f63536b38930530546570ac24ad8ac14ac3c21d4ccb4181b47af3c78591c1a474563c4d687cfeabe4eaf5ba680
-
Filesize
320B
MD5f6b2507e7ac6fcc49dfeb9b0ee401de4
SHA1cfe4ff551d97ef2083d15c34eb6cfd312ffc0e2d
SHA25694594e0ee76ee9a1a233f4509c79966d310e378a4a526623498ae2ac1243d783
SHA512a374754b5fe785fb4ea61a4ba02dde035c122522c4b93ad57819370644f021cd205d0dfc2ac491295635ca46dd0a3260830a3de8b31a9d576eccd26636fe0f40
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2