Overview
overview
3Static
static
3imrp_bypass.rar
windows7-x64
3imrp_bypass.rar
windows10-2004-x64
3RUN ME AS ADMIN.bat
windows7-x64
1RUN ME AS ADMIN.bat
windows10-2004-x64
1lscw.dll
windows7-x64
1lscw.dll
windows10-2004-x64
1menu.exe
windows7-x64
1menu.exe
windows10-2004-x64
1signaler.exe
windows7-x64
1signaler.exe
windows10-2004-x64
1stealth.dll
windows7-x64
1stealth.dll
windows10-2004-x64
1Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
imrp_bypass.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
imrp_bypass.rar
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
RUN ME AS ADMIN.bat
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
RUN ME AS ADMIN.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
lscw.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
lscw.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
menu.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
menu.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
signaler.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
signaler.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
stealth.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
stealth.dll
Resource
win10v2004-20240709-en
General
-
Target
imrp_bypass.rar
-
Size
419KB
-
MD5
b979b919bcfa7d66ed9e1d0e2d8694dd
-
SHA1
25e75cf1b9d83d6aeb6c4ec9ec62a9d00e5519ea
-
SHA256
9bdfeb3193bb8cdab70f4894727d4dc1b98f9794c211087c6a9122ea268ff36a
-
SHA512
5ce8302b57b007a9755fbc80602472e8a8d5f0d6f9de848279fe06fd63e6aedfed59743127c4527a8c935cbfb390e7d79e4fbd97c70582ec061372f0a6a15d50
-
SSDEEP
12288:PWE/j72meBM/xHK6Ezibj57oJgL05MANSp:PWEWmPbgg5vL0J+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2876 wrote to memory of 1716 2876 cmd.exe 30 PID 2876 wrote to memory of 1716 2876 cmd.exe 30 PID 2876 wrote to memory of 1716 2876 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\imrp_bypass.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\imrp_bypass.rar2⤵
- Modifies registry class
PID:1716
-