Analysis
-
max time kernel
152s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-07-2022 08:50
Static task
static1
Behavioral task
behavioral1
Sample
4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe
Resource
win10v2004-20220414-en
General
-
Target
4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe
-
Size
165KB
-
MD5
567cb2370a3c5521b1c343cce23126ac
-
SHA1
8fff0c1f83a78165d15711dc9dc6746c10299edf
-
SHA256
4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e
-
SHA512
fed721ecf3d5f68e5cfe79466bf02ed8d0e4830cac60efee1af0ba8eba84f25651f041391aec37dfc6e84e454b56f4167d84c3df425e9441433be7d3b3a0c94b
Malware Config
Extracted
buer
frrn8--_tgp_qsnnmpr,gldm86.6.-
cook5**\qdm\npkkjmo)diaj53+3+*
Signatures
-
resource yara_rule behavioral2/memory/1636-132-0x0000000000690000-0x0000000000699000-memory.dmp buer behavioral2/memory/1636-135-0x0000000040000000-0x0000000041000000-memory.dmp buer behavioral2/memory/1636-138-0x0000000040000000-0x0000000041000000-memory.dmp buer behavioral2/memory/4544-142-0x0000000040000000-0x0000000041000000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 4544 manager.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 2284 1636 WerFault.exe 78 236 4092 WerFault.exe 85 2020 4092 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4544 manager.exe 4544 manager.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1636 wrote to memory of 4544 1636 4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe 80 PID 1636 wrote to memory of 4544 1636 4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe 80 PID 1636 wrote to memory of 4544 1636 4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe 80 PID 4544 wrote to memory of 4092 4544 manager.exe 85 PID 4544 wrote to memory of 4092 4544 manager.exe 85 PID 4544 wrote to memory of 4092 4544 manager.exe 85 PID 4544 wrote to memory of 4092 4544 manager.exe 85 PID 4544 wrote to memory of 4092 4544 manager.exe 85 PID 4544 wrote to memory of 4092 4544 manager.exe 85 PID 4544 wrote to memory of 4092 4544 manager.exe 85 PID 4544 wrote to memory of 4092 4544 manager.exe 85 PID 4544 wrote to memory of 4092 4544 manager.exe 85 PID 4544 wrote to memory of 4092 4544 manager.exe 85 PID 4544 wrote to memory of 4092 4544 manager.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe"C:\Users\Admin\AppData\Local\Temp\4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe" ensgJJ2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 2684⤵
- Program crash
PID:236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 2764⤵
- Program crash
PID:2020
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 4362⤵
- Program crash
PID:2284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1636 -ip 16361⤵PID:948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4092 -ip 40921⤵PID:460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4092 -ip 40921⤵PID:900
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD5567cb2370a3c5521b1c343cce23126ac
SHA18fff0c1f83a78165d15711dc9dc6746c10299edf
SHA2564bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e
SHA512fed721ecf3d5f68e5cfe79466bf02ed8d0e4830cac60efee1af0ba8eba84f25651f041391aec37dfc6e84e454b56f4167d84c3df425e9441433be7d3b3a0c94b
-
Filesize
165KB
MD5567cb2370a3c5521b1c343cce23126ac
SHA18fff0c1f83a78165d15711dc9dc6746c10299edf
SHA2564bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e
SHA512fed721ecf3d5f68e5cfe79466bf02ed8d0e4830cac60efee1af0ba8eba84f25651f041391aec37dfc6e84e454b56f4167d84c3df425e9441433be7d3b3a0c94b