Analysis
-
max time kernel
194s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
30-05-2024 23:25
Static task
static1
Behavioral task
behavioral1
Sample
bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe
Resource
win7-20240221-en
General
-
Target
bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe
-
Size
662KB
-
MD5
0dd1f6c2b9bf477115701a1340d8d9a2
-
SHA1
7b074f54130217609435efe3f45ba38d363dd381
-
SHA256
bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711
-
SHA512
a3c8bcc7fe527eb2de6a6dd230bca9b4424653c6e251c1113bc27bd8c42cf79e1be1974e20c733e51be38f2c222ee1338257fd86209f2411f86e5f65213206e6
-
SSDEEP
12288:GubsNSOetfARQAPyGUu7zNubsNSOetfARQAPyGUfT+tkrvdv:GubsnafAPyjSzNubsnafAPyjZrvh
Malware Config
Extracted
systembc
cobusabobus.cam:4001
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
work.exepogflaw.exeratohwq.exeratohwq.exepid process 1340 work.exe 652 pogflaw.exe 4512 ratohwq.exe 1116 ratohwq.exe -
Drops file in Windows directory 2 IoCs
Processes:
pogflaw.exedescription ioc process File created C:\Windows\Tasks\ratohwq.job pogflaw.exe File opened for modification C:\Windows\Tasks\ratohwq.job pogflaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pogflaw.exepid process 652 pogflaw.exe 652 pogflaw.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.execmd.exework.exedescription pid process target process PID 2216 wrote to memory of 4624 2216 bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe cmd.exe PID 2216 wrote to memory of 4624 2216 bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe cmd.exe PID 2216 wrote to memory of 4624 2216 bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe cmd.exe PID 4624 wrote to memory of 1340 4624 cmd.exe work.exe PID 4624 wrote to memory of 1340 4624 cmd.exe work.exe PID 4624 wrote to memory of 1340 4624 cmd.exe work.exe PID 1340 wrote to memory of 652 1340 work.exe pogflaw.exe PID 1340 wrote to memory of 652 1340 work.exe pogflaw.exe PID 1340 wrote to memory of 652 1340 work.exe pogflaw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe"C:\Users\Admin\AppData\Local\Temp\bbf284e7e60430e7aa64fa92781ed283fd46883831720b959d8c786a42af7711.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\pogflaw.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\pogflaw.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:652
-
-
-
-
C:\ProgramData\wctn\ratohwq.exeC:\ProgramData\wctn\ratohwq.exe start21⤵
- Executes dropped EXE
PID:4512
-
C:\ProgramData\wctn\ratohwq.exeC:\ProgramData\wctn\ratohwq.exe start21⤵
- Executes dropped EXE
PID:1116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
335KB
MD5577cc10d77b4ee44f8613fc7df186048
SHA11d188a807f9a7c55f62ccd4820fe8b89fb8d9e8b
SHA256e871608d80293f723b1f44f465054f8a6528c2b0354435b9360aeb849a29701c
SHA5126183b03eaeb88e8ea1ef2ccedb65cbd04fc05c028ce8e2f9e0aed6636717e1e7c9994a8fb9cf4ebf36e277618db7f612a2af4557749b1f6ef6c2b115837618fa
-
Filesize
16KB
MD54f01c3d7439dde153ff0110a26e2a71c
SHA140d7203ad4e1fd40e13a56e6f747ee480740873c
SHA256cfb1fd0adf528fcf14647cf3fcd85fb7e4fddd2167b36f9e8b2424b62453df28
SHA512513d09b80e1ac80813bc691e71cdf5348478157350e43b9daed27741b7f5a7a16b2ae4d88ee9951395747c7f2a93ff0c1f2c3753a9e3bad2e2607767a1e3d28e