Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 20:03
Behavioral task
behavioral1
Sample
105e47edac958ce90d30885d09092170N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
105e47edac958ce90d30885d09092170N.exe
Resource
win10v2004-20240709-en
General
-
Target
105e47edac958ce90d30885d09092170N.exe
-
Size
41KB
-
MD5
105e47edac958ce90d30885d09092170
-
SHA1
d34a18b1e222d1acab1584a177ad6777190df62a
-
SHA256
c5e1d8677f89097f8cd64b57436aec439c7b6d7901606d1b2775185c7bbb6866
-
SHA512
9609f570c7b6ae84ce39dd771e1b5e6af10ce71680ed4586d71738f62c9075a5fff312f8477ded54f220c32be3b30dd93095343f4155ddc31bdf8cf64ca2a683
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 452 services.exe -
resource yara_rule behavioral2/memory/1832-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x00080000000234eb-4.dat upx behavioral2/memory/452-7-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1832-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/452-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/452-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/452-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/452-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/452-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/452-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/452-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1832-42-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/452-43-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1832-47-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/452-48-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x000c000000023442-58.dat upx behavioral2/memory/1832-196-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/452-197-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1832-309-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/452-310-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 105e47edac958ce90d30885d09092170N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\java.exe 105e47edac958ce90d30885d09092170N.exe File created C:\Windows\java.exe 105e47edac958ce90d30885d09092170N.exe File created C:\Windows\services.exe 105e47edac958ce90d30885d09092170N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1832 wrote to memory of 452 1832 105e47edac958ce90d30885d09092170N.exe 83 PID 1832 wrote to memory of 452 1832 105e47edac958ce90d30885d09092170N.exe 83 PID 1832 wrote to memory of 452 1832 105e47edac958ce90d30885d09092170N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\105e47edac958ce90d30885d09092170N.exe"C:\Users\Admin\AppData\Local\Temp\105e47edac958ce90d30885d09092170N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5da2fbc7b2179585aa78ac72b1b9fe2d7
SHA17d7974faacabd090b574d6816bce4dfdd2048e50
SHA2567387a24641e47d0a0e8aac47da5ad8565d22fe46a0911b70d7b32a83a4728470
SHA5121171f90ce6da81c4391c290d8a5005d12b31db800016865313ece2de847fd8f63b045a521e796c27951d3498fe56ba53bab34db0a2f90ce126f6f369a39142de
-
Filesize
175KB
MD57734ebe97ce7a1f19e73d9facfa2daa1
SHA1dac76388cfaad31168773c1552a1f4cd252f4598
SHA2565e4c2f179c73333805118053d6f1abb0a9c89ed142ee70fed7a647e3d0a1eedd
SHA512eb959e0f52e6bf950677fa81a31de1185dde00f31080da1adba62b9201e4275aeff300fb3a783825fc846f72d4840417c55b3f050b57c0ad9cb138538cd9f20a
-
Filesize
1KB
MD5211da0345fa466aa8dbde830c83c19f8
SHA1779ece4d54a099274b2814a9780000ba49af1b81
SHA256aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5
SHA51237fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
41KB
MD59c654f3384660a18efc19df58b587ba0
SHA108e5827fa7b58597cea657fc9f45a054cf940fba
SHA2564049355c073688f66c20406ce31533e5d1f5989948db70b1445f9ccc3ec990a9
SHA512a90e24405e1cada761ecf6524cb756f8ae1a04dbeee3f72ff379a21822ac8e2708cc35cc64897db7ff555e533398c8d9e4c034920206fa7205e7556f1db6d856
-
Filesize
160B
MD53c38f78ede207a29c6bc35fb4e7132f3
SHA15467240aaa0a778e53f5eb946554766d38733497
SHA256264e7d30252c085d3cc0c6e6bad84ff575e8571d48724ee679350fc239c8f22b
SHA51243856eda4bce82604dcc817139a559dfa92a1aa36725ffa718d916303049fafb4882d3bc57cc9ef9762efb327fb11b8978574b4e1d073764a6edac1facca5d87
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2