Overview
overview
10Static
static
10Tool/ConsoleApp1.exe
windows10-2004-x64
1Tool/Mono....db.dll
windows10-2004-x64
1Tool/Mono....ks.dll
windows10-2004-x64
1Tool/Tool.exe
windows10-2004-x64
10Tool/stub.exe
windows10-2004-x64
10Tool/x64/M...db.dll
windows10-2004-x64
1Tool/x64/M...ks.dll
windows10-2004-x64
1Tool/x64/fix.exe
windows10-2004-x64
10Tool/x64/fix1.exe
windows10-2004-x64
7Tool/x64/stub.exe
windows10-2004-x64
10Analysis
-
max time kernel
1194s -
max time network
1211s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-es -
resource tags
arch:x64arch:x86image:win10v2004-20240704-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
08-07-2024 04:59
Behavioral task
behavioral1
Sample
Tool/ConsoleApp1.exe
Resource
win10v2004-20240704-es
Behavioral task
behavioral2
Sample
Tool/Mono.Cecil.Pdb.dll
Resource
win10v2004-20240704-es
Behavioral task
behavioral3
Sample
Tool/Mono.Cecil.Rocks.dll
Resource
win10v2004-20240704-es
Behavioral task
behavioral4
Sample
Tool/Tool.exe
Resource
win10v2004-20240704-es
Behavioral task
behavioral5
Sample
Tool/stub.exe
Resource
win10v2004-20240704-es
Behavioral task
behavioral6
Sample
Tool/x64/Mono.Cecil.Pdb.dll
Resource
win10v2004-20240704-es
Behavioral task
behavioral7
Sample
Tool/x64/Mono.Cecil.Rocks.dll
Resource
win10v2004-20240704-es
Behavioral task
behavioral8
Sample
Tool/x64/fix.exe
Resource
win10v2004-20240704-es
Behavioral task
behavioral9
Sample
Tool/x64/fix1.exe
Resource
win10v2004-20240704-es
Behavioral task
behavioral10
Sample
Tool/x64/stub.exe
Resource
win10v2004-20240704-es
General
-
Target
Tool/x64/fix1.exe
-
Size
7.0MB
-
MD5
150f7378fd18d19ecc002761fa112de5
-
SHA1
a5ef247183d14dcd0d9b112306c1965c38720a1e
-
SHA256
b3bfd7d408a13096897fe8cbaff158cb8ff34f6d2d2269b25a1a268daeef387c
-
SHA512
dd3739f3e7736c6d6319dbf71346addfdab60d668c84b91d9c87bdf5ee7c6ea085b49a314c52338cb196cceb212067fdbf804da91d9f517a34e1b0978ceebb6d
-
SSDEEP
196608:YrUXA1HeT39IigDvKub75bcjWgbkzf7AkjdW86:k1+TtIisvB5IjWqkzZ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
fix1.exefix1.exepid process 4600 fix1.exe 3044 fix1.exe -
Loads dropped DLL 16 IoCs
Processes:
fix1.exefix1.exepid process 4140 fix1.exe 4140 fix1.exe 4140 fix1.exe 4140 fix1.exe 4140 fix1.exe 4140 fix1.exe 4140 fix1.exe 3044 fix1.exe 3044 fix1.exe 3044 fix1.exe 3044 fix1.exe 3044 fix1.exe 3044 fix1.exe 3044 fix1.exe 3044 fix1.exe 3044 fix1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
fix1.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Update64 = "C:\\Users\\Admin\\fix1.exe" fix1.exe -
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\fix1.exe pyinstaller -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4628 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 4628 taskkill.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
fix1.exefix1.execmd.exefix1.exedescription pid process target process PID 1548 wrote to memory of 4140 1548 fix1.exe fix1.exe PID 1548 wrote to memory of 4140 1548 fix1.exe fix1.exe PID 4140 wrote to memory of 2956 4140 fix1.exe cmd.exe PID 4140 wrote to memory of 2956 4140 fix1.exe cmd.exe PID 2956 wrote to memory of 4628 2956 cmd.exe taskkill.exe PID 2956 wrote to memory of 4628 2956 cmd.exe taskkill.exe PID 2956 wrote to memory of 4600 2956 cmd.exe fix1.exe PID 2956 wrote to memory of 4600 2956 cmd.exe fix1.exe PID 4600 wrote to memory of 3044 4600 fix1.exe fix1.exe PID 4600 wrote to memory of 3044 4600 fix1.exe fix1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tool\x64\fix1.exe"C:\Users\Admin\AppData\Local\Temp\Tool\x64\fix1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\Tool\x64\fix1.exe"C:\Users\Admin\AppData\Local\Temp\Tool\x64\fix1.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\activate.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\system32\taskkill.exetaskkill /f /im "fix1.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4628 -
C:\Users\Admin\fix1.exe"fix1.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\fix1.exe"fix1.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:3044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --field-trial-handle=4256,i,16137636041123227657,6836372490512237287,262144 --variations-seed-version --mojo-platform-channel-handle=4268 /prefetch:81⤵PID:116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=es --service-sandbox-type=asset_store_service --field-trial-handle=4076,i,16137636041123227657,6836372490512237287,262144 --variations-seed-version --mojo-platform-channel-handle=4576 /prefetch:81⤵PID:3500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
82KB
MD559d60a559c23202beb622021af29e8a9
SHA1a405f23916833f1b882f37bdbba2dd799f93ea32
SHA256706d4a0c26dd454538926cbb2ff6c64257c3d9bd48c956f7cabd6def36ffd13e
SHA5122f60e79603cf456b2a14b8254cec75ce8be0a28d55a874d4fb23d92d63bbe781ed823ab0f4d13a23dc60c4df505cbf1dbe1a0a2049b02e4bdec8d374898002b1
-
Filesize
122KB
MD52a834c3738742d45c0a06d40221cc588
SHA1606705a593631d6767467fb38f9300d7cd04ab3e
SHA256f20dfa748b878751ea1c4fe77a230d65212720652b99c4e5577bce461bbd9089
SHA512924235a506ce4d635fa7c2b34e5d8e77eff73f963e58e29c6ef89db157bf7bab587678bb2120d09da70594926d82d87dbaa5d247e861e331cf591d45ea19a117
-
Filesize
246KB
MD5f930b7550574446a015bc602d59b0948
SHA14ee6ff8019c6c540525bdd2790fc76385cdd6186
SHA2563b9ad1d2bc9ec03d37da86135853dac73b3fe851b164fe52265564a81eb8c544
SHA51210b864975945d6504433554f9ff11b47218caa00f809c6bce00f9e4089b862190a4219f659697a4ba5e5c21edbe1d8d325950921e09371acc4410469bd9189ee
-
Filesize
64KB
MD5b0262bd89a59a3699bfa75c4dcc3ee06
SHA1eb658849c646a26572dea7f6bfc042cb62fb49dc
SHA2564adfbbd6366d9b55d902fc54d2b42e7c8c989a83016ed707bd7a302fc3fc7b67
SHA5122e4b214de3b306e3a16124af434ff8f5ab832aa3eeb1aa0aa9b49b0ada0928dcbb05c57909292fbe3b01126f4cd3fe0dac9cc15eaea5f3844d6e267865b9f7b1
-
Filesize
155KB
MD5b71dbe0f137ffbda6c3a89d5bcbf1017
SHA1a2e2bdc40fdb83cc625c5b5e8a336ca3f0c29c5f
SHA2566216173194b29875e84963cd4dc4752f7ca9493f5b1fd7e4130ca0e411c8ac6a
SHA5129a5c7b1e25d8e1b5738f01aedfd468c1837f1ac8dd4a5b1d24ce86dcae0db1c5b20f2ff4280960bc523aee70b71db54fd515047cdaf10d21a8bec3ebd6663358
-
Filesize
81KB
MD59c6283cc17f9d86106b706ec4ea77356
SHA1af4f2f52ce6122f340e5ea1f021f98b1ffd6d5b6
SHA2565cc62aac52edf87916deb4ebbad9abb58a6a3565b32e7544f672aca305c38027
SHA51211fd6f570dd78f8ff00be645e47472a96daffa3253e8bd29183bccde3f0746f7e436a106e9a68c57cc05b80a112365441d06cc719d51c906703b428a32c93124
-
Filesize
35KB
MD5c1654ebebfeeda425eade8b77ca96de5
SHA1a4a150f1c810077b6e762f689c657227cc4fd257
SHA256aa1443a715fbf84a84f39bd89707271fc11a77b597d7324ce86fc5cfa56a63a9
SHA51221705b991e75efd5e59b8431a3b19ae5fcc38a3e7f137a9d52acd24e7f67d61758e48abc1c9c0d4314fa02010a1886c15ead5bca8dca1b1d4ccbfc3c589d342e
-
Filesize
1.3MB
MD5630153ac2b37b16b8c5b0dbb69a3b9d6
SHA1f901cd701fe081489b45d18157b4a15c83943d9d
SHA256ec4e6b8e9f6f1f4b525af72d3a6827807c7a81978cb03db5767028ebea283be2
SHA5127e3a434c8df80d32e66036d831cbd6661641c0898bd0838a07038b460261bf25b72a626def06d0faa692caf64412ca699b1fa7a848fe9d969756e097cba39e41
-
Filesize
5.0MB
MD5e547cf6d296a88f5b1c352c116df7c0c
SHA1cafa14e0367f7c13ad140fd556f10f320a039783
SHA25605fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA5129f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
6.7MB
MD5550288a078dffc3430c08da888e70810
SHA101b1d31f37fb3fd81d893cc5e4a258e976f5884f
SHA256789a42ac160cef98f8925cb347473eeeb4e70f5513242e7faba5139ba06edf2d
SHA5127244432fc3716f7ef27630d4e8fbc8180a2542aa97a01d44dca260ab43966dd8ac98b6023400b0478a4809aace1a128f1f4d6e544f2e591a5b436fd4c8a9d723
-
Filesize
29KB
MD58a273f518973801f3c63d92ad726ec03
SHA1069fc26b9bd0f6ea3f9b3821ad7c812fd94b021f
SHA256af358285a7450de6e2e5e7ff074f964d6a257fb41d9eb750146e03c7dda503ca
SHA5127fedae0573ecb3946ede7d0b809a98acad3d4c95d6c531a40e51a31bdb035badc9f416d8aaa26463784ff2c5e7a0cc2c793d62b5fdb2b8e9fad357f93d3a65f8
-
Filesize
1.1MB
MD504f35d7eec1f6b72bab9daf330fd0d6b
SHA1ecf0c25ba7adf7624109e2720f2b5930cd2dba65
SHA256be942308d99cc954931fe6f48ed8cc7a57891ccbe99aae728121bcda1fd929ab
SHA5123da405e4c1371f4b265e744229dcc149491a112a2b7ea8e518d5945f8c259cad15583f25592b35ec8a344e43007ae00da9673822635ee734d32664f65c9c8d9b
-
Filesize
83B
MD54c483a47143202b467470be273d52cbc
SHA18b24747b7f4206aaf0a01539cc862e788b3e7e90
SHA256245b5bf29eaf5a3d744f33b38f0964c97af662d733b40b86dd65bd181fa2b472
SHA51255f9d25b447e2e0c52f782721a05505c7a2096beb8051d45df15a7997ecade27ee17efc679c072fe5be1577b26ad214cb8823e42fa5efcd8ad6c6611483f14f1
-
Filesize
7.0MB
MD5150f7378fd18d19ecc002761fa112de5
SHA1a5ef247183d14dcd0d9b112306c1965c38720a1e
SHA256b3bfd7d408a13096897fe8cbaff158cb8ff34f6d2d2269b25a1a268daeef387c
SHA512dd3739f3e7736c6d6319dbf71346addfdab60d668c84b91d9c87bdf5ee7c6ea085b49a314c52338cb196cceb212067fdbf804da91d9f517a34e1b0978ceebb6d