Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-07-2022 07:13
Static task
static1
Behavioral task
behavioral1
Sample
3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c.exe
Resource
win10v2004-20220414-en
General
-
Target
3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c.exe
-
Size
32KB
-
MD5
39778e34740c753686317424739cf885
-
SHA1
5f9bada0cddd099b23148b1ddf5540f4061d4bc2
-
SHA256
3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c
-
SHA512
8dd071e4ae3ac48e4ab9e4c4d47ac53595ff49d30de92a002e62251d3d8382e19a498cf3f13bb6209100eb1eca3ea4920e65321dd224e3fe70a3126a23527ce5
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
svchost.exesvchost.exesvchost.exepid process 388 svchost.exe 4204 svchost.exe 4244 svchost.exe -
Drops file in Windows directory 2 IoCs
Processes:
3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c.exedescription ioc process File created C:\Windows\svchost.exe 3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c.exe File opened for modification C:\Windows\svchost.exe 3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4268 388 WerFault.exe svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
svchost.exedescription pid process target process PID 388 wrote to memory of 4204 388 svchost.exe svchost.exe PID 388 wrote to memory of 4204 388 svchost.exe svchost.exe PID 388 wrote to memory of 4204 388 svchost.exe svchost.exe PID 388 wrote to memory of 4244 388 svchost.exe svchost.exe PID 388 wrote to memory of 4244 388 svchost.exe svchost.exe PID 388 wrote to memory of 4244 388 svchost.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c.exe"C:\Users\Admin\AppData\Local\Temp\3c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c.exe"1⤵
- Drops file in Windows directory
PID:692
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\svchost.exeC:\Windows\svchost.exe Win72⤵
- Executes dropped EXE
PID:4204
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe Win72⤵
- Executes dropped EXE
PID:4244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 3682⤵
- Program crash
PID:4268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 388 -ip 3881⤵PID:2724
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD539778e34740c753686317424739cf885
SHA15f9bada0cddd099b23148b1ddf5540f4061d4bc2
SHA2563c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c
SHA5128dd071e4ae3ac48e4ab9e4c4d47ac53595ff49d30de92a002e62251d3d8382e19a498cf3f13bb6209100eb1eca3ea4920e65321dd224e3fe70a3126a23527ce5
-
Filesize
32KB
MD539778e34740c753686317424739cf885
SHA15f9bada0cddd099b23148b1ddf5540f4061d4bc2
SHA2563c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c
SHA5128dd071e4ae3ac48e4ab9e4c4d47ac53595ff49d30de92a002e62251d3d8382e19a498cf3f13bb6209100eb1eca3ea4920e65321dd224e3fe70a3126a23527ce5
-
Filesize
32KB
MD539778e34740c753686317424739cf885
SHA15f9bada0cddd099b23148b1ddf5540f4061d4bc2
SHA2563c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c
SHA5128dd071e4ae3ac48e4ab9e4c4d47ac53595ff49d30de92a002e62251d3d8382e19a498cf3f13bb6209100eb1eca3ea4920e65321dd224e3fe70a3126a23527ce5
-
Filesize
32KB
MD539778e34740c753686317424739cf885
SHA15f9bada0cddd099b23148b1ddf5540f4061d4bc2
SHA2563c836644d302fb352cecd7a7831809694eda0273406fb440e568e74f2cfc5d9c
SHA5128dd071e4ae3ac48e4ab9e4c4d47ac53595ff49d30de92a002e62251d3d8382e19a498cf3f13bb6209100eb1eca3ea4920e65321dd224e3fe70a3126a23527ce5