Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 04:31
Behavioral task
behavioral1
Sample
f80ba72a33fe8ffe1a2e06f6f94ca37c1a264451af416e43b2420d2ddfbbdd5f.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f80ba72a33fe8ffe1a2e06f6f94ca37c1a264451af416e43b2420d2ddfbbdd5f.exe
Resource
win10v2004-20240611-en
General
-
Target
f80ba72a33fe8ffe1a2e06f6f94ca37c1a264451af416e43b2420d2ddfbbdd5f.exe
-
Size
29KB
-
MD5
e3e368cc18b137994b353d98f084d306
-
SHA1
b3dbd2c82ec5ff3d2666809c0a71c181302aa78e
-
SHA256
f80ba72a33fe8ffe1a2e06f6f94ca37c1a264451af416e43b2420d2ddfbbdd5f
-
SHA512
7f2004bf10c5c3d033ea2e640b72103d177c171f1cef04beae4a77c611e43417cb2f20d30c5f97758c512ce111c0d7b61d647e7e48a95dd06c23e6be264dc845
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/II:AEwVs+0jNDY1qi/qv
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Executes dropped EXE 1 IoCs
Processes:
services.exepid process 3676 services.exe -
Processes:
resource yara_rule behavioral2/memory/1760-0-0x0000000000500000-0x0000000000510200-memory.dmp upx C:\Windows\services.exe upx behavioral2/memory/3676-6-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1760-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3676-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3676-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3676-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3676-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3676-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3676-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3676-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1760-42-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3676-43-0x0000000000400000-0x0000000000408000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\tmp8625.tmp upx behavioral2/memory/3676-166-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1760-163-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1760-261-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3676-262-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3676-266-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1760-270-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3676-271-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1760-328-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3676-329-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1760-478-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3676-479-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f80ba72a33fe8ffe1a2e06f6f94ca37c1a264451af416e43b2420d2ddfbbdd5f.exeservices.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" f80ba72a33fe8ffe1a2e06f6f94ca37c1a264451af416e43b2420d2ddfbbdd5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
Processes:
f80ba72a33fe8ffe1a2e06f6f94ca37c1a264451af416e43b2420d2ddfbbdd5f.exedescription ioc process File created C:\Windows\services.exe f80ba72a33fe8ffe1a2e06f6f94ca37c1a264451af416e43b2420d2ddfbbdd5f.exe File opened for modification C:\Windows\java.exe f80ba72a33fe8ffe1a2e06f6f94ca37c1a264451af416e43b2420d2ddfbbdd5f.exe File created C:\Windows\java.exe f80ba72a33fe8ffe1a2e06f6f94ca37c1a264451af416e43b2420d2ddfbbdd5f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
f80ba72a33fe8ffe1a2e06f6f94ca37c1a264451af416e43b2420d2ddfbbdd5f.exedescription pid process target process PID 1760 wrote to memory of 3676 1760 f80ba72a33fe8ffe1a2e06f6f94ca37c1a264451af416e43b2420d2ddfbbdd5f.exe services.exe PID 1760 wrote to memory of 3676 1760 f80ba72a33fe8ffe1a2e06f6f94ca37c1a264451af416e43b2420d2ddfbbdd5f.exe services.exe PID 1760 wrote to memory of 3676 1760 f80ba72a33fe8ffe1a2e06f6f94ca37c1a264451af416e43b2420d2ddfbbdd5f.exe services.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f80ba72a33fe8ffe1a2e06f6f94ca37c1a264451af416e43b2420d2ddfbbdd5f.exe"C:\Users\Admin\AppData\Local\Temp\f80ba72a33fe8ffe1a2e06f6f94ca37c1a264451af416e43b2420d2ddfbbdd5f.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0K2PF59Z\searchKDK9NICT.htmFilesize
178KB
MD55a10eef3289bbb902e41c167478d6e03
SHA1182bf866619e72d5a78aa5a095abfd8759460d32
SHA2561bc392aca61d5fb879aac6170c1ea3434e377e10463a2cffb7cbccbd7be56492
SHA5120c2a8a58650f28c1dcbfa864e0e6e23c73c200ae7e635199144404d01d53245616d59984b1f433f82d3a08b1a4f13e647082a046cf2831cef506b4175743f4b8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3NQFXGDW\results[4].htmFilesize
1KB
MD5211da0345fa466aa8dbde830c83c19f8
SHA1779ece4d54a099274b2814a9780000ba49af1b81
SHA256aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5
SHA51237fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3NQFXGDW\searchGPJWDTGY.htmFilesize
150KB
MD596787f253825efff1c695fe43cecb805
SHA1bdd9e204012822a2106ad32b2065c5b34ab98916
SHA256f85791805b27704325e883edd6de5d4bbb7d4212ff1d404c8e47bf5a9179ce54
SHA51297768b2b7e31e38c6bcdd1fc20ec31a62134cc2fb9bc2d53ceac885046cf68be8b4846ef6ebd01d3b3ea1f82bedad56f1e36eb7c32d855e74707d54c16d1509b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3NQFXGDW\search[1].htmFilesize
136KB
MD54be50e49ae91a4622e0c1ea57f13d42e
SHA1982f8c7f074435d34015782b64f8e578734965cb
SHA2566e614d7c391f82cce582642d9e166fd61742409039388061d6475f26447a3eed
SHA5122c07aced2e092cbbffcf206aee82bc3f6938de4de2d96eb6ef5c62610b2fa19d0075616b18608abbd2c96a66fbb769349984068430fb194acb0dc8d7dfe1f7f7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3NQFXGDW\search[3].htmFilesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EROQDKB0\searchVMJAZ8NQ.htmFilesize
157KB
MD529ac5e06819a0d77960c82b3ed6c05b5
SHA1538971a961e7e0ded8b702498a44b51b680be524
SHA256111843216d3a5bf5d7d72b1e94a6fd9fdace48a3eaa4825f2c7750debeea909e
SHA512d878404e29896a47216291c3aec959eeed79190b80172a4f365d44e916193a7afe884eca9bf15f52be8d81bdaf422277ce307a6975e0afb531b5d4b0b9618733
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RYAG7OSV\2AO2CGUD.htmFilesize
185KB
MD5fb0923715292b47a8e405993c129c627
SHA16a4a82032ab5d3e6015a6b24ef08094cd53eb19b
SHA256d39d0e4dc8ede54b9bd0c73f2253f52fd5f3fec68525737b981af50ad3276d52
SHA512ea7e5e5b35d46daafdc124331255920536f3e206b80c29a24758b7d836063d25dd0d97745524df57647f8b85d92cc34d3e2155d59a5b4f5038f2d6fb54a80250
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RYAG7OSV\search[2].htmFilesize
142KB
MD575f74bd3370e067adcbe880748730019
SHA150740826b65e4e93816e89138b5129ae83577db6
SHA2569a00fd304b6f6de56a644daff264cd0f7a73a910a261e16f122e0326b5a331d2
SHA512c20c5983afe80f8c92b6a5a5d6135d89b74a8cf226c7b5764d4a872dd4e85cecbcc4a74ea23c164dd8f49358da7cd048a546a945f9cdc61ae58eaee9b9095a5e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RYAG7OSV\search[6].htmFilesize
130KB
MD5ae6fed4feb817fe68e795c93e6495312
SHA1336fd156401a3dbfcd0857ec7374d6b21b5e198a
SHA256045fe9792caa2fc232e7808a595d00222d2b0ceb89d9f8a2b8321b0fead2ed69
SHA512985a9138407605ee5edecce327659c785357902df38d174d0f06ad2756118fb1944bce88f82b14343c6988d348521c18bddee3c9aa405e6e4da160e1ae60cfdf
-
C:\Users\Admin\AppData\Local\Temp\tmp8625.tmpFilesize
29KB
MD5cbd34fce9f820da7a04ba7ee7d63194a
SHA1d49a8fac0ff1f99b5c33907467c9d059a02291ef
SHA256b5aedaad142c72c9a883cbc14f5356aaace479c66180c984413adf8882606c4d
SHA512ae7728f6b3629f101e24258e107afa30a698b366ea2cbffaa29db58da38a5dc94d71c33c99d8fb301744322cbf8c3eca0e68ebe9334eaad6642bc666d024e983
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
352B
MD5a07fe74fa17879784dad41df7614452a
SHA182c2bced1b1a76e072c0a9110c54707f1d167bfb
SHA256a13f64c8495a05106f1616899d8f64fb77f64d3be263eca821f07c7fe551e891
SHA5125263cd36b728dd4be2a8662ac6cd1d89979264112a63475460902da7e4fb78ff0ddb16d0e34ff69dc0826e80de861f4c850a85565de6498582ff6c37703da68e
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
352B
MD566c3dc2d6a6c6b872e5ecddc201e66e7
SHA1caf445300d9d26b885e850a24484f8b03895fede
SHA2564af0671189068bea250d1efc11b8dda456acef71cf6621c9cdbb8e7c3c2caeb0
SHA512c4e3e9f807f7a5485317f6219e3f8b8c791d020851319c506e8115cc26d5799d8ddd72348d1f81cb059184f8de826aae1058fe9fbb23bbbfccd609c796b2bfdc
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
352B
MD58619a7cfa78ca7cfd524309f2bc1f2ca
SHA1b47a1cca3ebbcc5e63aee87d66559bef59efb1a5
SHA256d35f50ed55d74574c95c83bb3632a47ac282cc0ea318a5365b16fd41370a96dd
SHA512ecb43047c3b4fe98c39989decbedd2825bb00a1abfe0f5f2a5e5badec9ea8338e72caef065b807d6f5be7795f5e8fb1feb179a97aa237d7b2d4618d695b2fb7b
-
C:\Users\Admin\AppData\Local\Temp\zincite.logMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Windows\services.exeFilesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2
-
memory/1760-0-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/1760-261-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/1760-13-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/1760-478-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/1760-42-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/1760-270-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/1760-163-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/1760-328-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/3676-31-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3676-262-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3676-266-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3676-166-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3676-271-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3676-43-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3676-38-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3676-329-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3676-36-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3676-26-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3676-24-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3676-19-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3676-14-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3676-6-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3676-479-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB