Analysis

  • max time kernel
    154s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-08-2022 04:11

General

  • Target

    5a42e580aa875567dd08135b5f89ae69f4a541b9c737125f9123ad0ed5f5b369.exe

  • Size

    242KB

  • MD5

    f3bb116720f37b7b2d1f12599feac582

  • SHA1

    9810174d6533d843c89c84a0d4e6487177c26b69

  • SHA256

    5a42e580aa875567dd08135b5f89ae69f4a541b9c737125f9123ad0ed5f5b369

  • SHA512

    8b5bc8a41596da47a7ee217870ed4309cd8b398c50a02f83bd17452c8e336ec60339891783454b871dfc46d12a419a2eb689f95912564cf650c5b529e49f1d91

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a42e580aa875567dd08135b5f89ae69f4a541b9c737125f9123ad0ed5f5b369.exe
    "C:\Users\Admin\AppData\Local\Temp\5a42e580aa875567dd08135b5f89ae69f4a541b9c737125f9123ad0ed5f5b369.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Windows\5117202417101548\winrrcc.exe
      C:\Windows\5117202417101548\winrrcc.exe
      2⤵
      • Executes dropped EXE
      PID:4768
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 424
        3⤵
        • Program crash
        PID:4624
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 464
      2⤵
      • Program crash
      PID:3736
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 540 -ip 540
    1⤵
      PID:3408
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4768 -ip 4768
      1⤵
        PID:4000

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\5117202417101548\winrrcc.exe

        Filesize

        242KB

        MD5

        f3bb116720f37b7b2d1f12599feac582

        SHA1

        9810174d6533d843c89c84a0d4e6487177c26b69

        SHA256

        5a42e580aa875567dd08135b5f89ae69f4a541b9c737125f9123ad0ed5f5b369

        SHA512

        8b5bc8a41596da47a7ee217870ed4309cd8b398c50a02f83bd17452c8e336ec60339891783454b871dfc46d12a419a2eb689f95912564cf650c5b529e49f1d91

      • C:\Windows\5117202417101548\winrrcc.exe

        Filesize

        242KB

        MD5

        f3bb116720f37b7b2d1f12599feac582

        SHA1

        9810174d6533d843c89c84a0d4e6487177c26b69

        SHA256

        5a42e580aa875567dd08135b5f89ae69f4a541b9c737125f9123ad0ed5f5b369

        SHA512

        8b5bc8a41596da47a7ee217870ed4309cd8b398c50a02f83bd17452c8e336ec60339891783454b871dfc46d12a419a2eb689f95912564cf650c5b529e49f1d91

      • memory/540-130-0x0000000005617000-0x000000000561F000-memory.dmp

        Filesize

        32KB

      • memory/540-131-0x0000000005617000-0x000000000561F000-memory.dmp

        Filesize

        32KB

      • memory/540-132-0x0000000000400000-0x000000000529D000-memory.dmp

        Filesize

        78.6MB

      • memory/540-139-0x0000000005617000-0x000000000561F000-memory.dmp

        Filesize

        32KB

      • memory/540-140-0x0000000000400000-0x000000000529D000-memory.dmp

        Filesize

        78.6MB

      • memory/4768-133-0x0000000000000000-mapping.dmp

      • memory/4768-136-0x0000000005657000-0x000000000565F000-memory.dmp

        Filesize

        32KB

      • memory/4768-137-0x0000000005657000-0x000000000565F000-memory.dmp

        Filesize

        32KB

      • memory/4768-138-0x0000000000400000-0x000000000529D000-memory.dmp

        Filesize

        78.6MB

      • memory/4768-141-0x0000000000400000-0x000000000529D000-memory.dmp

        Filesize

        78.6MB