Overview
overview
3Static
static
3ASM/example1.exe
windows7-x64
3ASM/example1.exe
windows10-2004-x64
3ASM/make.bat
windows7-x64
1ASM/make.bat
windows10-2004-x64
1C/rstat32.exe
windows7-x64
1C/rstat32.exe
windows10-2004-x64
1C/self.exe
windows7-x64
1C/self.exe
windows10-2004-x64
1bin2inch.exe
windows7-x64
1bin2inch.exe
windows10-2004-x64
1binpack.exe
windows7-x64
1binpack.exe
windows10-2004-x64
1build.bat
windows7-x64
1build.bat
windows10-2004-x64
1hash.exe
windows7-x64
1hash.exe
windows10-2004-x64
1hash.bat
windows7-x64
1hash.bat
windows10-2004-x64
1image.exe
windows7-x64
1image.exe
windows10-2004-x64
1image.bat
windows7-x64
1image.bat
windows10-2004-x64
1ripers.bat
windows7-x64
1ripers.bat
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
ASM/example1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ASM/example1.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
ASM/make.bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
ASM/make.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
C/rstat32.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
C/rstat32.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
C/self.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
C/self.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
bin2inch.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
bin2inch.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
binpack.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
binpack.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
build.bat
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
build.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
hash.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
hash.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
hash.bat
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
hash.bat
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
image.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
image.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
image.bat
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
image.bat
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
ripers.bat
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
ripers.bat
Resource
win10v2004-20240508-en
General
-
Target
build.bat
-
Size
153B
-
MD5
5f5a4c156301e95a6721fbf77ff90ea9
-
SHA1
a32783b93b36535ca19419dcae1b395337cd40bf
-
SHA256
13703b199aa3cbc9e79835a3b822949cfae3949961a4a63b614799dd79ffc317
-
SHA512
e28e45fc72ae56bac2890653e63f8c8b69635e766435544320d221fd87e38ce04ac85b6c5295f37451e8403cdaa0ba7c3f1870b491bdc5aa392d5f042e03d821
Malware Config
Signatures
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 4 IoCs
pid Process 2192 hash.EXE 2152 binpack.exe 2140 image.EXE 2120 bin2inch.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2192 2084 cmd.exe 31 PID 2084 wrote to memory of 2192 2084 cmd.exe 31 PID 2084 wrote to memory of 2192 2084 cmd.exe 31 PID 2084 wrote to memory of 2192 2084 cmd.exe 31 PID 2084 wrote to memory of 2152 2084 cmd.exe 32 PID 2084 wrote to memory of 2152 2084 cmd.exe 32 PID 2084 wrote to memory of 2152 2084 cmd.exe 32 PID 2084 wrote to memory of 2152 2084 cmd.exe 32 PID 2084 wrote to memory of 2140 2084 cmd.exe 33 PID 2084 wrote to memory of 2140 2084 cmd.exe 33 PID 2084 wrote to memory of 2140 2084 cmd.exe 33 PID 2084 wrote to memory of 2140 2084 cmd.exe 33 PID 2084 wrote to memory of 2120 2084 cmd.exe 34 PID 2084 wrote to memory of 2120 2084 cmd.exe 34 PID 2084 wrote to memory of 2120 2084 cmd.exe 34 PID 2084 wrote to memory of 2120 2084 cmd.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\build.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\hash.EXEhash2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\binpack.exebinpack.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\image.EXEimage2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\bin2inch.exebin2inch.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2120
-