Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 04:29
Behavioral task
behavioral1
Sample
f03b8754e79cc7c6eed6acf2ed3eb04abccd3e58e2339915eba7f282ffcd2673.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f03b8754e79cc7c6eed6acf2ed3eb04abccd3e58e2339915eba7f282ffcd2673.exe
Resource
win10v2004-20240508-en
General
-
Target
f03b8754e79cc7c6eed6acf2ed3eb04abccd3e58e2339915eba7f282ffcd2673.exe
-
Size
41KB
-
MD5
2f439db4aec8404926b56b7443ae016e
-
SHA1
74a26ff258e652ae19082b7d5817a07e88b7a085
-
SHA256
f03b8754e79cc7c6eed6acf2ed3eb04abccd3e58e2339915eba7f282ffcd2673
-
SHA512
bf6a9eaff30de64ca2e69a8d90c236649b89a7183e2d2ecdadddeec195b41093d9b5b5abe370561e404b44bb59f2894c3da0fdbf6498c494792bb6e5469236ba
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Executes dropped EXE 1 IoCs
Processes:
services.exepid process 1656 services.exe -
Processes:
resource yara_rule behavioral2/memory/1656-7-0x0000000000400000-0x0000000000408000-memory.dmp upx C:\Windows\services.exe upx behavioral2/memory/3896-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3896-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1656-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1656-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1656-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1656-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1656-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3896-35-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1656-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3896-37-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1656-38-0x0000000000400000-0x0000000000408000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\tmp7368.tmp upx behavioral2/memory/3896-244-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1656-245-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3896-258-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1656-259-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1656-261-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1656-266-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3896-265-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1656-401-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3896-400-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3896-582-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1656-583-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3896-696-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1656-697-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f03b8754e79cc7c6eed6acf2ed3eb04abccd3e58e2339915eba7f282ffcd2673.exeservices.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" f03b8754e79cc7c6eed6acf2ed3eb04abccd3e58e2339915eba7f282ffcd2673.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
Processes:
f03b8754e79cc7c6eed6acf2ed3eb04abccd3e58e2339915eba7f282ffcd2673.exedescription ioc process File created C:\Windows\services.exe f03b8754e79cc7c6eed6acf2ed3eb04abccd3e58e2339915eba7f282ffcd2673.exe File opened for modification C:\Windows\java.exe f03b8754e79cc7c6eed6acf2ed3eb04abccd3e58e2339915eba7f282ffcd2673.exe File created C:\Windows\java.exe f03b8754e79cc7c6eed6acf2ed3eb04abccd3e58e2339915eba7f282ffcd2673.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
f03b8754e79cc7c6eed6acf2ed3eb04abccd3e58e2339915eba7f282ffcd2673.exedescription pid process target process PID 3896 wrote to memory of 1656 3896 f03b8754e79cc7c6eed6acf2ed3eb04abccd3e58e2339915eba7f282ffcd2673.exe services.exe PID 3896 wrote to memory of 1656 3896 f03b8754e79cc7c6eed6acf2ed3eb04abccd3e58e2339915eba7f282ffcd2673.exe services.exe PID 3896 wrote to memory of 1656 3896 f03b8754e79cc7c6eed6acf2ed3eb04abccd3e58e2339915eba7f282ffcd2673.exe services.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f03b8754e79cc7c6eed6acf2ed3eb04abccd3e58e2339915eba7f282ffcd2673.exe"C:\Users\Admin\AppData\Local\Temp\f03b8754e79cc7c6eed6acf2ed3eb04abccd3e58e2339915eba7f282ffcd2673.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0RV7W6KN\results[10].htmFilesize
1KB
MD535a826c9d92a048812533924ecc2d036
SHA1cc2d0c7849ea5f36532958d31a823e95de787d93
SHA2560731a24ba3c569a734d2e8a74f9786c4b09c42af70457b185c56f147792168ea
SHA512fd385904a466768357de812d0474e34a0b5f089f1de1e46bd032d889b28f10db84c869f5e81a0e2f1c8ffdd8a110e0736a7d63c887d76de6f0a5fd30bb8ebecd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0RV7W6KN\search[3].htmFilesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0RV7W6KN\search[7].htmFilesize
142KB
MD5ea412230e434f0e1b5e443b5610233c5
SHA1403545df6aee30d29f8c37585268396da676db30
SHA256cd148a87f2a9b0c5a6199f0ba06f5f1b4845cfeffd0c0fdbf493b2598ba283da
SHA51217b220efbc9992a904966c936d67bd3ee3804f92beeda73459d4d58b3ef0c5c4219dff64ab34f3f2eb9b19fcef247b0f5abe825f13e6756b6e38d03f73d0c310
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0RV7W6KN\search[8].htmFilesize
134KB
MD5906ee32aee3401291086c79293e712c8
SHA13ce3ee3f076307af4e092ae5b6f933da0aa54795
SHA2560b355409f8e5832527205a79bc4cbbffe3e54527586fa9cc018b3fff31057334
SHA512354575b03b3ded778480994bf3d0ad7628d663ec4c542dab1412be0496f087660821bdc519ad599b3f12ff2e8c67592ae9bdc002aa5f6c6a903daaa3eccb3ad1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6TQEXKX3\results[3].htmFilesize
1KB
MD5211da0345fa466aa8dbde830c83c19f8
SHA1779ece4d54a099274b2814a9780000ba49af1b81
SHA256aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5
SHA51237fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6TQEXKX3\search156PW9ZX.htmFilesize
157KB
MD5365751f05b74f3fa0f8dc13a68f8ad65
SHA1bec4d8edd6048ef307198a5143379d69068c2a11
SHA2562ed099f6dc72f9c6453a87721252a54797f9c9df6d1438cbe1372721f00f2889
SHA512cc5ddd6e75e433e506d420ea9a1e65f1d3b7890db9c7549f8e37033d4ff08ef5f5b06c993018549456413ba8e9822cbd3fe3a1201f9fcd0bd858445e442be0ad
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6TQEXKX3\search[6].htmFilesize
122KB
MD5a8e599f2af0c4b6f99626ec972848286
SHA11ffd0f90cefc12a5e0760c4d696441a04c8e94ae
SHA256f89fd6d4fb29d1bfaac49b8c8f38802dceab3523c4adaa75db8a017690496ceb
SHA51286cb45159daa7eaf4d8f3dab8f632afc051b0101237c1bec791646a1ce2d3b863aa964385e0e272711744d7ffa789799e4f7a15ef85dd21f161502c2b7a5714d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6TQEXKX3\search[8].htmFilesize
148KB
MD50e3adfa0b001b97dd535a38eb4ace4e3
SHA11ef57c26ebcc6d83f85a9f19c9529ee6e2ffc384
SHA256b8888e2467f8707b35ce9250842228437b7db1211c9244c47b879063852c3117
SHA512086a6bf78c4bdc2b2176753e4c170253a50804bf297c775184e9b16e2cc2e4c06d2ea1b6eaa6b9edfef454d71143050220598861fd0a2ac1dfeb3c0572e05493
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DKWDYRX8\3DTCNHJX.htmFilesize
175KB
MD513fb6ba0f7889e3c2472a94242f500e2
SHA1179c87b66c6160701f9a95271128a077c6ab4219
SHA2561d47b244916633d4e434c49449f5cd90a774445da23a9416ea35dd2719379738
SHA512d37866a99dd85fa907663f19d05665be1d669e1763b0c94e978e77ef099c8cbbf343dc4ae953345cc00acc1fe80c57106fdf4fc7d3542b060dd8aaa817a7afa0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DKWDYRX8\results[3].htmFilesize
1KB
MD5ee4aed56584bf64c08683064e422b722
SHA145e5ba33f57c6848e84b66e7e856a6b60af6c4a8
SHA256a4e6ba8c1fe3df423e6f17fcbeeaa7e90e2bd2fffe8f98ff4b3e6ed970e32c61
SHA512058f023cb934a00c8f1c689001438c9bdd067d923ddcbe7a951f54d3ca82218803e0e81fbc9af5c56375ff7961deed0359af1ffa7335d41379ee97d01a76ded6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DKWDYRX8\searchK8DIRDGO.htmFilesize
129KB
MD5c8d53ad81de6c27947dc60e95588a2f3
SHA165f012d3bf69a718118f0e7218be792b79daf78f
SHA2561fd143eaff24077fc2a8391f255f64f0199ea23c8bdcd3c614e1d53e3a83579c
SHA512dfbbfe947cf3efa8780a60d1e03263023440581f9b6e7a7662c345299bee0ef1c944e0d81bef191dc688389c49a514517fd02f2e0d3f89b8013a56957f227530
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DKWDYRX8\searchV32R4KLJ.htmFilesize
144KB
MD59056b909a35acb25b4fd0bf37ea6ec1f
SHA1f80e51af33263fd688d4067617f85c713600af31
SHA2567b98cd12131f9c1e31a52ef6dd72e618fb74a493947af9732f9524e956fd7eea
SHA512e9849e930f3cf2ef76a7bc6c9ec5fa6a527d06101a7a1fadce56dc032717a10de0fbd32ca05204aa9ba27809fe63c96ed4a903c440a4db6ebbbe9d1a6e39b1e8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DKWDYRX8\search[9].htmFilesize
135KB
MD56f79894817271c25fc381828920d69b8
SHA17d06bbd2d3547885bc8b6c0309c7d4b4fdeab62a
SHA25673169ec708fc9431f7e6cd86bb1607ada26501f8c77dcfa3c41d7816f1892fba
SHA512f9333d45a7359017045968933cc38ec390c49c435be7e8a84c0db8547ef8964588d859866bf80d90d829b1da248074ed1d79ff8235161a2ef8b3d6921b9bb631
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PGYR01BB\default[2].htmFilesize
312B
MD5c15952329e9cd008b41f979b6c76b9a2
SHA153c58cc742b5a0273df8d01ba2779a979c1ff967
SHA2565d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA5126aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PGYR01BB\search4JWTXVKQ.htmFilesize
113KB
MD59cbfedc15d529dd3e0ae1998bb3d61da
SHA1c559faf5763b204777067e46e911f80977f10d2a
SHA2566161df6d5cc8ca1daedd5a039e48d6b3e9a69fb91d62a6d53b67b5a025bc116e
SHA512ac7617c1ad1763ca1750aaf6a8689ff26da2f44c1d32deb7d66617dff8dd4a904a3a125e14825c50e6500681b5c8e081b2ecb9b6f0e83548b9b7789f2fa2d5bc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PGYR01BB\search[10].htmFilesize
129KB
MD5d193b38b5ab11b2a41d1584a48bdfede
SHA1dc4eb7bffa845dea058f1b6dca0e9f0f4c8954dc
SHA256354f538da2b5b3253e695cc4da706eda61a8f96e07be7e4f0bdfb67191528879
SHA512ed771e7ede57855b4ed0e5a91f5c824344e08da96904aad5a508fa7cc695b3d67d14eb69034263e6040044d4c6ff2214e87143d03346443be7a4f5ad94611a40
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PGYR01BB\search[3].htmFilesize
147KB
MD51c150875105a58de74429ceefa89dba8
SHA14bb9c27a6b70a8f68dd442fd49a10810ed24676a
SHA2560ebf17ab867e28ad610f5abb2f66ab263ae5cde2b72c4126593c107f80c2a9e9
SHA5128d546bc8b6f36c6d1e1f9e200461a115c23d41a07453f7d6f7b4bee5d397222f741f3400b32166359ad44aad7869ddf8d61f8a12c4dfa12f6c1fed76d67616cc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PGYR01BB\search[7].htmFilesize
120KB
MD50dfd83782356f1a6379d1b2faba42459
SHA1bfc4a2067804c2a234ef3917175154844dadaa7a
SHA256d03e5ff501965d4a7765256455174eec0b800e242d5c7736163ce4ffcaddf825
SHA5123b06133301345a9980f68435e01f6dbfa568a16642a1a06767bdd66995f79cec4cc01b2411172c079abc32b9b847c918790cd4b96a6e38504e2ef5694572e0e3
-
C:\Users\Admin\AppData\Local\Temp\tmp7368.tmpFilesize
41KB
MD58ba60263cd0cab3c676d365ecf8e903d
SHA19174b84b887997d1bc21eda2015649272ef97366
SHA256b71f8d2af806ba0fa27d1c2e56f0a3590d084da77775af843c81589071a176de
SHA512aae2ef718dee06bc7d8f80ac52a4e1865eba7685bdd5f014b9b9ec17670d2c0b392d40db1bf4d278034914320661b802acbbd94c7a649e987bce799e3770837a
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
160B
MD5636d2cf3ed3f6cca1e6f6fec0e779503
SHA1776e64dcf79c20a1bae691028d21b820f09a7060
SHA256ae5c2bf016ef91225b208a670f7e862fcebc09cc84660e6315bb9f06291ca6a4
SHA512d8403f445170829134b77fa9f62434a7148a4642da5a4175e27e028d5db104ba65235e4d7666ec66b57f6415b93f27afe0ae2b442a45b98cd50f55a847e8d64e
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
160B
MD56d07e618d9984cef7da84eeffcd11aa0
SHA1ab2915df96e350822055bca41c87b0b625a30ce6
SHA2560423fe614dbcb5a0c42b4bd59dd5002c5ba8baa0b29c0336ce62f1aed7434ae1
SHA512ca4a4242622e958075e86da6f08fb09acac3f3605149043ec2c41e0458fbdf95ff7497114239b3c2f5480f88a40fae9672375de8fca496503de8fb292e827ab0
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
160B
MD540006b1a038b0bced606af3f8d24adb1
SHA1c6014abc7d5d1b88b9852b495626129d5943084b
SHA256fd23903ba35a8d6d009c4f9ce538ca3803c33e759b13bc712f6488bcc9deae78
SHA512bdc80bfa2e8b183c01352d0c0a89094c3c9ddb61bde15e77a0f1c9a791fc29a95d6016341292be064d2312c04c577429286d88d835a3b6023c631adffde866ec
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
160B
MD5f5516b78dd0f6acf346505c8b9954e65
SHA1685033dfade541a993723e8813b7bb442d20b88c
SHA256dd359b198885373a65e28e078f5dde33e24d1522578f18ebdd291e78f009679e
SHA51227174f434dd98a7da0da8fc9f3c5a087a99faebe0e45600878e6764299bbaf2d471c4024fd9fa6a69bbeb9855a6c763056188c72f35f9633a9a7e2cf3dd5152e
-
C:\Users\Admin\AppData\Local\Temp\zincite.logMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Windows\services.exeFilesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2
-
memory/1656-38-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1656-266-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1656-14-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1656-261-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1656-259-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1656-697-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1656-245-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1656-583-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1656-401-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1656-19-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1656-7-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1656-24-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1656-36-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1656-26-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1656-31-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3896-244-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/3896-582-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/3896-35-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/3896-37-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/3896-400-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/3896-696-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/3896-258-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/3896-265-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/3896-13-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/3896-0-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB