Overview
overview
10Static
static
10triage/Build.bat
windows7-x64
1triage/Build.bat
windows10-2004-x64
1triage/builder.exe
windows7-x64
1triage/builder.exe
windows10-2004-x64
1triage/config.json
windows7-x64
3triage/config.json
windows10-2004-x64
3triage/keygen.exe
windows7-x64
1triage/keygen.exe
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 03:58
Behavioral task
behavioral1
Sample
triage/Build.bat
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
triage/Build.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
triage/builder.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
triage/builder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
triage/config.json
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
triage/config.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
triage/keygen.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
triage/keygen.exe
Resource
win10v2004-20240508-en
General
-
Target
triage/Build.bat
-
Size
741B
-
MD5
4e46e28b2e61643f6af70a8b19e5cb1f
-
SHA1
804a1d0c4a280b18e778e4b97f85562fa6d5a4e6
-
SHA256
8e83a1727696ced618289f79674b97305d88beeeabf46bd25fc77ac53c1ae339
-
SHA512
009b17b515ff0ea612e54d8751eef07f1e2b54db07e6cd69a95e7adf775f3c79a0ea91bff2fe593f2314807fdc00c75d80f1807b7dbe90f0fcf94607e675047b
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3092 wrote to memory of 1928 3092 cmd.exe 82 PID 3092 wrote to memory of 1928 3092 cmd.exe 82 PID 3092 wrote to memory of 1928 3092 cmd.exe 82 PID 3092 wrote to memory of 740 3092 cmd.exe 83 PID 3092 wrote to memory of 740 3092 cmd.exe 83 PID 3092 wrote to memory of 740 3092 cmd.exe 83 PID 3092 wrote to memory of 4528 3092 cmd.exe 84 PID 3092 wrote to memory of 4528 3092 cmd.exe 84 PID 3092 wrote to memory of 4528 3092 cmd.exe 84 PID 3092 wrote to memory of 4600 3092 cmd.exe 85 PID 3092 wrote to memory of 4600 3092 cmd.exe 85 PID 3092 wrote to memory of 4600 3092 cmd.exe 85 PID 3092 wrote to memory of 888 3092 cmd.exe 86 PID 3092 wrote to memory of 888 3092 cmd.exe 86 PID 3092 wrote to memory of 888 3092 cmd.exe 86 PID 3092 wrote to memory of 5040 3092 cmd.exe 87 PID 3092 wrote to memory of 5040 3092 cmd.exe 87 PID 3092 wrote to memory of 5040 3092 cmd.exe 87 PID 3092 wrote to memory of 3364 3092 cmd.exe 88 PID 3092 wrote to memory of 3364 3092 cmd.exe 88 PID 3092 wrote to memory of 3364 3092 cmd.exe 88
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\triage\Build.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\triage\keygen.exekeygen -path C:\Users\Admin\AppData\Local\Temp\triage\Build -pubkey pub.key -privkey priv.key2⤵PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\triage\builder.exebuilder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\triage\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\triage\Build\LB3Decryptor.exe2⤵PID:740
-
-
C:\Users\Admin\AppData\Local\Temp\triage\builder.exebuilder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\triage\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\triage\Build\LB3.exe2⤵PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\triage\builder.exebuilder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\triage\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\triage\Build\LB3_pass.exe2⤵PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\triage\builder.exebuilder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\triage\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\triage\Build\LB3_Rundll32.dll2⤵PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\triage\builder.exebuilder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\triage\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\triage\Build\LB3_Rundll32_pass.dll2⤵PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\triage\builder.exebuilder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\triage\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\triage\Build\LB3_ReflectiveDll_DllMain.dll2⤵PID:3364
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD5d8ff4cec7972c9fcc56bff7564ace104
SHA1da7ec111e060cb8a7ca6eb287e753db7aa80526c
SHA25634de3052bbec0797dedd6509fab359ee3f14ab144907e341377d2c25bbf5e739
SHA512428db941d90221c5f93164cb85948a7aa935ede8a305aa32930a0148b868d9645e060f7fcc02415755b0e4b60af5b07961ba321349eab8a64e93b319dac90581
-
Filesize
344B
MD59b3efc3b76481d6a0b2b8b42d5c49da9
SHA1f3af0535600750677e27fcb9cf4d8ff06402ecc9
SHA256e6320fb1283b0cc4fd578121f512c78b2993ee078bfd6b57f12aa40cfb243fef
SHA512aefdfd79da35378b6fab841736c721acca820735336843807fd0fb7ef74b092afb72adea88f19ffb12e818d4c0fdeaba4848f787a2c5bfa0ee91e250727ef312