Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 21:46
Behavioral task
behavioral1
Sample
58b116786a56d1ef2875dd3b2fb10197c6af667b7bd9e6eda4b6c95beaa5ad02.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
58b116786a56d1ef2875dd3b2fb10197c6af667b7bd9e6eda4b6c95beaa5ad02.exe
Resource
win10v2004-20240611-en
General
-
Target
58b116786a56d1ef2875dd3b2fb10197c6af667b7bd9e6eda4b6c95beaa5ad02.exe
-
Size
41KB
-
MD5
03140098382f0c9118ca5e897722e954
-
SHA1
2b416875fcf18860c734d33be0c626934f471308
-
SHA256
58b116786a56d1ef2875dd3b2fb10197c6af667b7bd9e6eda4b6c95beaa5ad02
-
SHA512
3ea1fc367ac0214a1b4871913d057a553ae53695e6f45c207bab314433c000397716354d58f209e07d7b55371bf5e1ad69f42fdb8db3d99c124efdba4de84dea
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2720 services.exe -
resource yara_rule behavioral2/files/0x00080000000235eb-4.dat upx behavioral2/memory/1048-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2720-7-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1048-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2720-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2720-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2720-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2720-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1048-30-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2720-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x000b000000023397-41.dat upx behavioral2/memory/1048-130-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2720-131-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1048-219-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2720-220-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1048-223-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2720-224-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1048-228-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2720-229-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1048-244-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2720-245-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2720-249-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1048-272-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2720-273-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1048-458-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2720-459-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1048-586-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2720-587-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 58b116786a56d1ef2875dd3b2fb10197c6af667b7bd9e6eda4b6c95beaa5ad02.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 58b116786a56d1ef2875dd3b2fb10197c6af667b7bd9e6eda4b6c95beaa5ad02.exe File opened for modification C:\Windows\java.exe 58b116786a56d1ef2875dd3b2fb10197c6af667b7bd9e6eda4b6c95beaa5ad02.exe File created C:\Windows\java.exe 58b116786a56d1ef2875dd3b2fb10197c6af667b7bd9e6eda4b6c95beaa5ad02.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2720 1048 58b116786a56d1ef2875dd3b2fb10197c6af667b7bd9e6eda4b6c95beaa5ad02.exe 89 PID 1048 wrote to memory of 2720 1048 58b116786a56d1ef2875dd3b2fb10197c6af667b7bd9e6eda4b6c95beaa5ad02.exe 89 PID 1048 wrote to memory of 2720 1048 58b116786a56d1ef2875dd3b2fb10197c6af667b7bd9e6eda4b6c95beaa5ad02.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\58b116786a56d1ef2875dd3b2fb10197c6af667b7bd9e6eda4b6c95beaa5ad02.exe"C:\Users\Admin\AppData\Local\Temp\58b116786a56d1ef2875dd3b2fb10197c6af667b7bd9e6eda4b6c95beaa5ad02.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1276,i,7977653611488681184,6839495125838449898,262144 --variations-seed-version --mojo-platform-channel-handle=4380 /prefetch:81⤵PID:4112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD52896745a1d3b5470dbbf153aead82540
SHA19c04aaab593dd008c88e86b977708317cc3fc6e3
SHA256cda7ab9dae2660c80c66132ecd39e6b7bf74865312574872e3b8ff7c76368338
SHA51285794d1f4a9825398d384b3a576457995fe6e531bb0da1f4eeb16292b6bdeb2254387761b3e1e5821f20697e02e1f24dbd23fb464349a0d57bf915399c7529d8
-
Filesize
1KB
MD5ee4aed56584bf64c08683064e422b722
SHA145e5ba33f57c6848e84b66e7e856a6b60af6c4a8
SHA256a4e6ba8c1fe3df423e6f17fcbeeaa7e90e2bd2fffe8f98ff4b3e6ed970e32c61
SHA512058f023cb934a00c8f1c689001438c9bdd067d923ddcbe7a951f54d3ca82218803e0e81fbc9af5c56375ff7961deed0359af1ffa7335d41379ee97d01a76ded6
-
Filesize
1KB
MD5211da0345fa466aa8dbde830c83c19f8
SHA1779ece4d54a099274b2814a9780000ba49af1b81
SHA256aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5
SHA51237fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca
-
Filesize
165KB
MD521b59562253c6ec1cf3e7d49fc79c38c
SHA167aec1be382ae9d653563d8324b99512613b783f
SHA256a0eba5999a08295b627b02905357c17a4b30e3976d6e84731ff23e2f0d8b7c2b
SHA51268221cdc2f76b8e49eed900f11da6da8e286a1fc6723011f7d541b548c72a1afe9e5f39f3c3c90529d7047d29a5b214428a43ee2b84fa695fc51aa1f1d15f0e3
-
Filesize
123KB
MD5b26abd2e8c1d286df19157d262436e86
SHA164e171de521b221df1e15bbf3c51369d7542c1e3
SHA2567c48f43a1a9963be07cc8745ba3e3169866922475aa8d470aff6ae7bceda03af
SHA5127e9dbc21b2444709f92f6f0380e6d8dde1b52859318f66eec2806837e2fb183490d5c91207bc8849c0ea6f4429384fddfebd52a9e6e0109ca3ccb33d97eea08e
-
Filesize
138KB
MD56e9530a97ad8aba5696415aa9ee8338e
SHA10ef1a348f3cccc776d6d624ebd4dc542f746a220
SHA25603ddb7d255eb7292ca96303c8ac77952f690006fab7bca04cc1994d996ba20f7
SHA512c0d3644e7597423bf96eb3db7a551e994ac44d0a2f30e6083281fbaf481c341250d48a303a00ea337ccd9d6acb4fa4671afe28c023823417c0aed5ae6292f6df
-
Filesize
158KB
MD587477accb0e99563e1e18e6232ec243b
SHA1c90f47ddfa3ca5c6f519fd042dd50281ed4b7d09
SHA2563aafdc7c6132800bc1f0c1c72db749bdb8007ed0f51a874fc4f71f8d786096c3
SHA5123ee68342a3bfce884eb5edc7a380b5dd088b638231aa4296a5aefd0b3ab848ec4049661ac63e336c8fc3101f48ea242105eb16fa8a9ba7a3982a8633cc1187f0
-
Filesize
143KB
MD5993180862a9c1fb8c61ee16f5400d3ad
SHA1d55564ab0be46f09528d431b76c4a7c362b9805c
SHA2562b1f2339f84ff436c3ef9db27ce7222f54549046e06375763478630cad91bd89
SHA51253ec1dccd8404892d7e9c0dcb8a505c44796c53ddab2c54dfa370a827ea9253a658479cfe7c2a7f2bfdcb2ba162e5bc209eb695dc2e36e7b1142cc745c6f6ff2
-
Filesize
115KB
MD500cacaf3a8439071fa771ccc6c9165bd
SHA1c64bbea80ec251a544e29392136340c3c05a8ee4
SHA25686e76392930948bec1df24fb098e1201734e15abcbbcb1bd3ea810f8f1856ce1
SHA512e05f267739c7e5da46e6138f24bf5a5c7c8511d94c1f40c53fd4aa3d9d5cf5270042416160539f0f25b6a9095fadcea2ec2d5a178cde4885835cb41a18ac0899
-
Filesize
159KB
MD55a03398988b1a451400f078d32b443a7
SHA125690e73f229146d39b5bb1e367a1da582804ead
SHA256ab9464c57185a3cbabec3fe1e791713ae56882d7fdb170887f20da14c9a30a06
SHA512df0d93fd4d180ae0302141b7a216b3d046523ffa9f2792d89d514c612567154485bd1eae826611edf80af7b218d89169f80713bcf209d4412c92b84e54796900
-
Filesize
134KB
MD58860b41f4c5202db6a7c0fff3a6a2da8
SHA1811a7b70c387241052665be355b79b143f51cf0d
SHA256d24092587dcbb4339043a4ad435d3c909e291ed63ef05e545703303f6af97c0c
SHA5120f0d0ea409c05b321640977371f3636875069e95a0948eb598396c7e6419cc75393df2ec5a46506a27b317e716b8a96795af6994a05de47998da714ac5b20c1a
-
Filesize
185KB
MD57dd0adafdfe74e8fc5cea2dab626c252
SHA16c99d3414f7f8ff19abca90cc6b6405eba9b9747
SHA2566e83e14883b00dd099b759f1190a0f1642166f3e8b846dddc4638fc030cf0254
SHA5121eef70f53bdf584c09f74db30717443310f840bd2b6209007c662c96a13a0a08f0358db7f9eaa82dfb306d836f5a0c40bb307e8fe293003e2ee3883ca942b1fe
-
Filesize
138KB
MD5374a3b1248ea93ca33fd08f2117d80cf
SHA1f56b28de6a5d4ca9ab580b94fc259964d50a64c4
SHA256e19718ad3e82ec54d92bb4b3ce04a1357928a8594b193aa4205f0d8224d4cbb9
SHA5120b1b7c189956a02451142c2774809306b6965af181f03c3c8ba8d9a41bc62c6370b617ce34631567bca2f526fe0e7a12151064b5c16647bb5744e380723f8ad9
-
Filesize
102KB
MD56f0a32aa003d957d71ed11c48eca4295
SHA1744929f6c7645c3e1746d8210c158e091ed6c3a4
SHA25693b0ec1a5ff932b569948dd168f5b5d3e9cedbe158109dbff4676f4defb40036
SHA512d99864ab8bf20e8f14a70fbba52cafe73838ac334cc5509cd9923228034da74fc8015c6f9d0df2b98a43bce9df2c165d1e60fa227fe005848b05ba882d5149f7
-
Filesize
157KB
MD56b93414cfbf428af6e1a49dc698761e6
SHA169f4cb0eca19f3b0e094f5ac7095a5329bf918ee
SHA256ef5218d1f2a06b8d7a598e839903d8385896f6d8f1d12611973904f19d39324a
SHA512cef23160ba229eaded7521b6e194c020bccc19f605c95d14970737d9247d9d4dede371064da6e704527b1902a1e0d6a1c862c76a157c845cafb4681da6fb39ec
-
Filesize
130KB
MD5625bead79d7dffbb246870af18228121
SHA142b47938a5b76ce9c23e5337827c185ca600beac
SHA2567176da234474523cb0c94e9f6e66fb325f3586d7775f1ddd101a499424545141
SHA51234fa2ca03d776c0e1cae7806bdfc8cffe7f1e030c4a2bad834345c1a32f8d353a590da68eafb77c8022df2f1a1cc6e30aa67bd22db53ab1074dd9a066ff60993
-
Filesize
112KB
MD5ae2121f4ae6a09ca3d2c0c21577473e1
SHA123970f9c0af46b7a055c80529d099181edb4ffb0
SHA25695edac183c999fb36d26e328478b465650886d033558a66239beba4351097119
SHA51281056a8ff7f304ca5fbbb4dcd62e51ff1dc1f38907347e9f7931bb99cd69f8518ce31131bd115c02f5f0b78c9fb93ff88c05d2fbe7fb623db3c7acad5fb9b555
-
Filesize
150KB
MD518cb8c7522a5e99203514e69f4e94954
SHA113f18b0180d17a2f7c516592eaf1f3bf1952d6e6
SHA256c5ed7f5b5cae7d57897d73cace5656b5194850b0220c2c74df30d6f5c0fc8224
SHA51273301e419dee54ed91599c0700da249394e96571da77d548cc34ff8e65eab48f0b247997bedd34e63eb8cc73da15de71e14440e8517ca462f740ef90ffd9c58b
-
Filesize
120KB
MD52bb716c7ee4512b2a5370598f83ce112
SHA12857617f5f5250ecd6d5f11ec5d31a6aa6f1d963
SHA2565e68ab561923c033cc0cf4fa09d393e12f03d968ffec6ebf6b34f3aa7eafcb82
SHA5125c969a8eec7c3f16c5242cbb81b84c0e2bf4bf2d12ebeb0cb08a7c08160bec828ed40390e856cd3ae72156384caea5df10031227f7e14f20d1001fb2a40d4acf
-
Filesize
151KB
MD5c50da02b9b7131ebcc36ea3a6dbf6315
SHA10509108378841e3d7a201fab0114249a4d09e32f
SHA2569c09ed771f1e16d09ba1c4352912ca6bb46191593ca773616bfcd4c91ac2af8f
SHA512beddff6b117056512ee1899f73600639824869bd9b302522b76e41586414269fe4faf31787401b443e06ac1956fc1445e7d44da43fd2f429d568dd891f00c991
-
Filesize
113KB
MD577e64f9ea3414c12eb2283f21573333f
SHA10ce854386fee7d7b6c87719b4764416d938e19ae
SHA2569eed2b1d78ad822d804bb31d9ec0c7fa02bb3ba46273dde82cef4c32773949eb
SHA5124ec59d6e4ccef67316c2e994f30c2abd88e5d756aa29ff714445b303c3b412452782a69e75187ad5db8245d9da70e6e8bb7c817cba719f74e98694645dc28a0a
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
160KB
MD55722f1443c68cafb9e1c9b0e14d4b812
SHA1ff00203da414e67870a5f16e9ab9249d460a9bea
SHA2568bef4645c70a2d763a209d2b4146ee4f039cb86a7f9298979358796ca10dc24a
SHA5120f1f6b9ec26626f48593f0cc615d2c3976142d2f1337a5ecc1ddb3df2a58f13abb0a5e77390e6bc06520f4f4c3432d6410259d233beda2352ca8a7d96b0d3d6d
-
Filesize
41KB
MD5b8967f7d15dccbd07cd6d3acd1dcd72a
SHA1e3fd36e966304ed5eb1e761fa68141e4663364a2
SHA2562a22b7414f47a98a8760ece55fc7f3c763403d049a00525f74dc5798e0d8398b
SHA5125ef3e94867e4fde520a32356a2c8786c3e7147b2a17a623a5f058949d1f1cc3a89a4617f5786cb35037ce100c474f7b44aa7f6cb242690c82afd13234512ba3d
-
Filesize
160B
MD55b3931ae1dfa2592c426a2626de55385
SHA1122c5d30d23ba8af48fe9fff446e27db48c0860e
SHA2561f6a6e71a5732a5caa6cfb28076540b1a6ed830f0c60da862ec8f78eeaba352d
SHA5129b6215dc5bc433da92a04136bce7c15a079b69ade1181b93083038021b45a03f1606413dea11c971082d6f14a308ae8930ac9b506e63a2574561ab16c7975682
-
Filesize
160B
MD5bf555347c2f4fe47f93e0dae230a364a
SHA1b3d6b45ebedf92bba8b5ab5326e2ca0cb0826ace
SHA2565ca716e057ef14c64bfd82e85e3df4dde86b6bcc677ae3464be1a0f67a6b3e40
SHA5122e098588613ba9330c85e999f8074c80e3b06046d722fbebf9b40bda0101371d11e1655ebe079579e4d00f00a5c4a919b5e827d01ca4e56ea7905e68ba4c6e01
-
Filesize
160B
MD581fb0d13993c4c203454c35fc3be93b2
SHA1829af0316dbf21ea69d1735b021a426b66924bc2
SHA25660892e37e977c0ad6ac5192e8ca941fdbd2220528d15c254edf321e000253b09
SHA512b78dde0f207ed5b5a10bc732034490e558b973d468553aaa693b0ffe8c6c5931ef87d48d92baad9502fcc2bafac5bcbce02775f60d2ad42479212ce1cb260fc2
-
Filesize
160B
MD51795e76949395d95554a21ab34df99e8
SHA195706aab89e86c536b5364c9a724cfe20d22101c
SHA2568a51fc85af15eea12b30e9a39e7cee6e21a46278039af2bd5c776984c964687c
SHA512e98761fc3159e9bc1238401728f8c2f4448135fcfba32fb3c74a278d6d7b437361338fb1e6398ac7e8fc966c1181dd29507341177a318eb34f21753d4ccf5c5a
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2