Analysis
-
max time kernel
142s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe
Resource
win10v2004-20240611-en
General
-
Target
c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe
-
Size
6.8MB
-
MD5
28acddf226514843a2fda0b049d94395
-
SHA1
cf387c8e5a3af7e02a409417be06e3c2a745751b
-
SHA256
c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59
-
SHA512
e09e7fc359e9a2221cd1ca5e6083b186b961143d0c21b756d4eb8eddaba8e72e2059ef5f3824736c0455ce72d5c00fab21f862513fc47623373d67f17d0cced8
-
SSDEEP
98304:LDvPIbilG4fUxB/nKTvAxJdNYcq/NY0B8gc6cZjWt+Z//37ibd4s6uipukP:oVxBfHxn6x6ILc6k2+ZHrhs65
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4836 aria2c.exe -
resource yara_rule behavioral2/files/0x0007000000023424-20.dat upx behavioral2/memory/4836-23-0x0000000000400000-0x00000000008B0000-memory.dmp upx behavioral2/memory/4836-25-0x0000000000400000-0x00000000008B0000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2616 c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe 2616 c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe 2616 c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe 2616 c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2616 c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe 2616 c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2616 wrote to memory of 4592 2616 c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe 85 PID 2616 wrote to memory of 4592 2616 c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe 85 PID 2616 wrote to memory of 4592 2616 c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe 85 PID 4592 wrote to memory of 4836 4592 cmd.exe 88 PID 4592 wrote to memory of 4836 4592 cmd.exe 88 PID 4592 wrote to memory of 4836 4592 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe"C:\Users\Admin\AppData\Local\Temp\c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.execmd /c cd download&aria2c.exe --conf-path ./aria2.conf --check-certificate=false --disable-ipv6=false --enable-rpc=true --rpc-allow-origin-all=true --rpc-listen-all=true --rpc-listen-port 6288 --listen-port 6388 --dht-listen-port 6390 --enable-dht=true --enable-dht6=true --dht-file-path=./dht.dat --dht-file-path6=./dht6.dat --quiet=true --stop-with-process=26162⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\download\aria2c.exearia2c.exe --conf-path ./aria2.conf --check-certificate=false --disable-ipv6=false --enable-rpc=true --rpc-allow-origin-all=true --rpc-listen-all=true --rpc-listen-port 6288 --listen-port 6388 --dht-listen-port 6390 --enable-dht=true --enable-dht6=true --dht-file-path=./dht.dat --dht-file-path6=./dht6.dat --quiet=true --stop-with-process=26163⤵
- Executes dropped EXE
PID:4836
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d08f927d8a53cc5a7b97515318d126ad
SHA1124d281c70d345566cc85a4680a993b754d2007e
SHA25607e07944a526a7e9fb60bfedef59189b5950946f5a39b6df36de8ab74abf8729
SHA512e90abf11942e3dd261039a4d9876659ec69a6099005c0f321e426d3de9ab20feb7b0105e98e7bc7747548ed4edfbb82bb0bc11c9d262e4db829aeb26ef1461bf
-
Filesize
1.8MB
MD56d1fe9171538df42e013e6ecf330ec48
SHA1a85203e77419c484a4434d56f96a0404b73ec588
SHA256ef342516f4e2c211cd70cef033e558d598229c75e39292b668ae4ea7bf09eafe
SHA5126603d1a60aa610c3269f9592877ef1a56f4dfe0f2496c017434ae1074fe8c3d0348386316129607d5dc09af1e7ae35f67e12fd72131652dc95e308b5581e1fbd