Overview
overview
10Static
static
10triage/Build.bat
windows7-x64
1triage/Build.bat
windows10-2004-x64
1triage/builder.exe
windows7-x64
1triage/builder.exe
windows10-2004-x64
1triage/config.json
windows7-x64
3triage/config.json
windows10-2004-x64
3triage/keygen.exe
windows7-x64
1triage/keygen.exe
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 03:58
Behavioral task
behavioral1
Sample
triage/Build.bat
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
triage/Build.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
triage/builder.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
triage/builder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
triage/config.json
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
triage/config.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
triage/keygen.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
triage/keygen.exe
Resource
win10v2004-20240508-en
General
-
Target
triage/Build.bat
-
Size
741B
-
MD5
4e46e28b2e61643f6af70a8b19e5cb1f
-
SHA1
804a1d0c4a280b18e778e4b97f85562fa6d5a4e6
-
SHA256
8e83a1727696ced618289f79674b97305d88beeeabf46bd25fc77ac53c1ae339
-
SHA512
009b17b515ff0ea612e54d8751eef07f1e2b54db07e6cd69a95e7adf775f3c79a0ea91bff2fe593f2314807fdc00c75d80f1807b7dbe90f0fcf94607e675047b
Malware Config
Signatures
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 7 IoCs
pid Process 2120 keygen.exe 3044 builder.exe 2152 builder.exe 2144 builder.exe 2356 builder.exe 3048 builder.exe 2624 builder.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2120 2716 cmd.exe 29 PID 2716 wrote to memory of 2120 2716 cmd.exe 29 PID 2716 wrote to memory of 2120 2716 cmd.exe 29 PID 2716 wrote to memory of 2120 2716 cmd.exe 29 PID 2716 wrote to memory of 3044 2716 cmd.exe 30 PID 2716 wrote to memory of 3044 2716 cmd.exe 30 PID 2716 wrote to memory of 3044 2716 cmd.exe 30 PID 2716 wrote to memory of 3044 2716 cmd.exe 30 PID 2716 wrote to memory of 2152 2716 cmd.exe 31 PID 2716 wrote to memory of 2152 2716 cmd.exe 31 PID 2716 wrote to memory of 2152 2716 cmd.exe 31 PID 2716 wrote to memory of 2152 2716 cmd.exe 31 PID 2716 wrote to memory of 2144 2716 cmd.exe 32 PID 2716 wrote to memory of 2144 2716 cmd.exe 32 PID 2716 wrote to memory of 2144 2716 cmd.exe 32 PID 2716 wrote to memory of 2144 2716 cmd.exe 32 PID 2716 wrote to memory of 2356 2716 cmd.exe 33 PID 2716 wrote to memory of 2356 2716 cmd.exe 33 PID 2716 wrote to memory of 2356 2716 cmd.exe 33 PID 2716 wrote to memory of 2356 2716 cmd.exe 33 PID 2716 wrote to memory of 3048 2716 cmd.exe 34 PID 2716 wrote to memory of 3048 2716 cmd.exe 34 PID 2716 wrote to memory of 3048 2716 cmd.exe 34 PID 2716 wrote to memory of 3048 2716 cmd.exe 34 PID 2716 wrote to memory of 2624 2716 cmd.exe 35 PID 2716 wrote to memory of 2624 2716 cmd.exe 35 PID 2716 wrote to memory of 2624 2716 cmd.exe 35 PID 2716 wrote to memory of 2624 2716 cmd.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\triage\Build.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\triage\keygen.exekeygen -path C:\Users\Admin\AppData\Local\Temp\triage\Build -pubkey pub.key -privkey priv.key2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\triage\builder.exebuilder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\triage\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\triage\Build\LB3Decryptor.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\triage\builder.exebuilder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\triage\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\triage\Build\LB3.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\triage\builder.exebuilder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\triage\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\triage\Build\LB3_pass.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\triage\builder.exebuilder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\triage\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\triage\Build\LB3_Rundll32.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\triage\builder.exebuilder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\triage\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\triage\Build\LB3_Rundll32_pass.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\triage\builder.exebuilder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\triage\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\triage\Build\LB3_ReflectiveDll_DllMain.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2624
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD55acff71271cac8aad542eb2132cb749b
SHA12dacdec871dc329e020ff794749856ff7d7f1a96
SHA256170c867ddf20e00af3a3534344fe2ed4addc66021d7274c4cec6c350f3e62fca
SHA512548984dba80bf215c87d56c10f51e1b4256a8fa63133e8de94fe04bf2eb2c5c492de540b350f2b5139d46ce7fbcb9c020f43ed8198e953a9a69f430d17eba632
-
Filesize
344B
MD52fa46b6af5e1df1d31dab63ea0d90819
SHA1e04d2c9c598cc25a33a42bc799bee18f136e3c09
SHA256f3f04c04bca76d6a989b6226aea9a7e8c6f72d9eeb5df42b500f8a673f2b7cee
SHA512080304bbd9be7c5b29a62fc877f4791510de31c851b5c9f22e598ec80c1ffed40368a3324a18b79602afe1d08ec9f06a9f17b94be61b7cf37a1e7b3c5042b89d