Analysis
-
max time kernel
127s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-07-2022 07:13
Static task
static1
Behavioral task
behavioral1
Sample
3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c.exe
Resource
win10v2004-20220414-en
General
-
Target
3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c.exe
-
Size
32KB
-
MD5
39778e34740c753686317424739cf885
-
SHA1
5f9bada0cddd099b23148b1ddf5540f4061d4bc2
-
SHA256
3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c
-
SHA512
8dd071e4ae3ac48e4ab9e4c4d47ac53595ff49d30de92a002e62251d3d8382e19a498cf3f13bb6209100eb1eca3ea4920e65321dd224e3fe70a3126a23527ce5
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exesvchost.exepid process 992 svchost.exe 1696 svchost.exe -
Drops file in Windows directory 2 IoCs
Processes:
3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c.exedescription ioc process File created C:\Windows\svchost.exe 3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c.exe File opened for modification C:\Windows\svchost.exe 3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 364 992 WerFault.exe svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
svchost.exedescription pid process target process PID 992 wrote to memory of 1696 992 svchost.exe svchost.exe PID 992 wrote to memory of 1696 992 svchost.exe svchost.exe PID 992 wrote to memory of 1696 992 svchost.exe svchost.exe PID 992 wrote to memory of 1696 992 svchost.exe svchost.exe PID 992 wrote to memory of 364 992 svchost.exe WerFault.exe PID 992 wrote to memory of 364 992 svchost.exe WerFault.exe PID 992 wrote to memory of 364 992 svchost.exe WerFault.exe PID 992 wrote to memory of 364 992 svchost.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c.exe"C:\Users\Admin\AppData\Local\Temp\3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c.exe"1⤵
- Drops file in Windows directory
PID:1968
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\svchost.exeC:\Windows\svchost.exe Win72⤵
- Executes dropped EXE
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 1722⤵
- Program crash
PID:364
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD539778e34740c753686317424739cf885
SHA15f9bada0cddd099b23148b1ddf5540f4061d4bc2
SHA2563c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c
SHA5128dd071e4ae3ac48e4ab9e4c4d47ac53595ff49d30de92a002e62251d3d8382e19a498cf3f13bb6209100eb1eca3ea4920e65321dd224e3fe70a3126a23527ce5
-
Filesize
32KB
MD539778e34740c753686317424739cf885
SHA15f9bada0cddd099b23148b1ddf5540f4061d4bc2
SHA2563c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c
SHA5128dd071e4ae3ac48e4ab9e4c4d47ac53595ff49d30de92a002e62251d3d8382e19a498cf3f13bb6209100eb1eca3ea4920e65321dd224e3fe70a3126a23527ce5
-
Filesize
32KB
MD539778e34740c753686317424739cf885
SHA15f9bada0cddd099b23148b1ddf5540f4061d4bc2
SHA2563c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c
SHA5128dd071e4ae3ac48e4ab9e4c4d47ac53595ff49d30de92a002e62251d3d8382e19a498cf3f13bb6209100eb1eca3ea4920e65321dd224e3fe70a3126a23527ce5