Analysis
-
max time kernel
157s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-06-2022 23:19
Static task
static1
Behavioral task
behavioral1
Sample
11e12e20e3688dfd70b7a29b38a2e58f964b891b5fb89c6896c8c0a73c40021d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
11e12e20e3688dfd70b7a29b38a2e58f964b891b5fb89c6896c8c0a73c40021d.exe
Resource
win10v2004-20220414-en
General
-
Target
11e12e20e3688dfd70b7a29b38a2e58f964b891b5fb89c6896c8c0a73c40021d.exe
-
Size
265KB
-
MD5
c3613bd934dde67b05ba3983fba2bdfd
-
SHA1
4bbe90eda2a079bd651c442ca0136053ae9b90b8
-
SHA256
11e12e20e3688dfd70b7a29b38a2e58f964b891b5fb89c6896c8c0a73c40021d
-
SHA512
54fc5e3b5b06ce6e943447794a67cd435d2bd1b02c19ea2710f7cc7364afded4224c31ddee4de6f531f89c25291d22f2c54ae74a7856827be382c9a90b22da46
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
aumnq.exepid process 2416 aumnq.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3392 4220 WerFault.exe 11e12e20e3688dfd70b7a29b38a2e58f964b891b5fb89c6896c8c0a73c40021d.exe -
NTFS ADS 1 IoCs
Processes:
11e12e20e3688dfd70b7a29b38a2e58f964b891b5fb89c6896c8c0a73c40021d.exedescription ioc process File created \??\c:\programdata\6d6f5f6124\aumnq.exe:Zone.Identifier 11e12e20e3688dfd70b7a29b38a2e58f964b891b5fb89c6896c8c0a73c40021d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
11e12e20e3688dfd70b7a29b38a2e58f964b891b5fb89c6896c8c0a73c40021d.exeaumnq.exedescription pid process target process PID 4220 wrote to memory of 2416 4220 11e12e20e3688dfd70b7a29b38a2e58f964b891b5fb89c6896c8c0a73c40021d.exe aumnq.exe PID 4220 wrote to memory of 2416 4220 11e12e20e3688dfd70b7a29b38a2e58f964b891b5fb89c6896c8c0a73c40021d.exe aumnq.exe PID 4220 wrote to memory of 2416 4220 11e12e20e3688dfd70b7a29b38a2e58f964b891b5fb89c6896c8c0a73c40021d.exe aumnq.exe PID 2416 wrote to memory of 4068 2416 aumnq.exe REG.exe PID 2416 wrote to memory of 4068 2416 aumnq.exe REG.exe PID 2416 wrote to memory of 4068 2416 aumnq.exe REG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11e12e20e3688dfd70b7a29b38a2e58f964b891b5fb89c6896c8c0a73c40021d.exe"C:\Users\Admin\AppData\Local\Temp\11e12e20e3688dfd70b7a29b38a2e58f964b891b5fb89c6896c8c0a73c40021d.exe"1⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
\??\c:\programdata\6d6f5f6124\aumnq.exec:\programdata\6d6f5f6124\aumnq.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\ProgramData\6d6f5f61243⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 2802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4220 -ip 42201⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\0MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\ProgramData\6d6f5f6124\aumnq.exeFilesize
265KB
MD5c3613bd934dde67b05ba3983fba2bdfd
SHA14bbe90eda2a079bd651c442ca0136053ae9b90b8
SHA25611e12e20e3688dfd70b7a29b38a2e58f964b891b5fb89c6896c8c0a73c40021d
SHA51254fc5e3b5b06ce6e943447794a67cd435d2bd1b02c19ea2710f7cc7364afded4224c31ddee4de6f531f89c25291d22f2c54ae74a7856827be382c9a90b22da46
-
\??\c:\programdata\6d6f5f6124\aumnq.exeFilesize
265KB
MD5c3613bd934dde67b05ba3983fba2bdfd
SHA14bbe90eda2a079bd651c442ca0136053ae9b90b8
SHA25611e12e20e3688dfd70b7a29b38a2e58f964b891b5fb89c6896c8c0a73c40021d
SHA51254fc5e3b5b06ce6e943447794a67cd435d2bd1b02c19ea2710f7cc7364afded4224c31ddee4de6f531f89c25291d22f2c54ae74a7856827be382c9a90b22da46
-
memory/2416-139-0x0000000002B24000-0x0000000002B2C000-memory.dmpFilesize
32KB
-
memory/2416-132-0x0000000000000000-mapping.dmp
-
memory/2416-138-0x0000000000400000-0x000000000283E000-memory.dmpFilesize
36.2MB
-
memory/2416-142-0x0000000002B24000-0x0000000002B2C000-memory.dmpFilesize
32KB
-
memory/2416-143-0x0000000000400000-0x000000000283E000-memory.dmpFilesize
36.2MB
-
memory/2416-144-0x0000000000400000-0x000000000283E000-memory.dmpFilesize
36.2MB
-
memory/4068-141-0x0000000000000000-mapping.dmp
-
memory/4220-135-0x0000000002995000-0x000000000299C000-memory.dmpFilesize
28KB
-
memory/4220-136-0x0000000002950000-0x0000000002959000-memory.dmpFilesize
36KB
-
memory/4220-137-0x0000000000400000-0x000000000283E000-memory.dmpFilesize
36.2MB
-
memory/4220-130-0x0000000000400000-0x000000000283E000-memory.dmpFilesize
36.2MB
-
memory/4220-131-0x0000000002995000-0x000000000299C000-memory.dmpFilesize
28KB