Analysis

  • max time kernel
    150s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 11:47

General

  • Target

    d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f.exe

  • Size

    138KB

  • MD5

    ee58d24ea7bcbfcb92aa56cd623764dd

  • SHA1

    e96433741f75823d0963848d03f03afc1fa230ca

  • SHA256

    d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f

  • SHA512

    0b32bea0493ab7a0db20ef9f8f3d2bb47018740f58951dc831334e0382744431c3cbb7c0b55da8e722971132de9fdb1819d5496c44b9d5b7f5d1809485a2acb0

  • SSDEEP

    3072:6JB9wBaSfsQV9+xlOLGaUQ/eHVR5+PZVbqo:Y0eQV9+xsLGaU9/gP3O

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 6 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f.exe
    "C:\Users\Admin\AppData\Local\Temp\d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Windows\Hdagua.exe
      C:\Windows\Hdagua.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:1672
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 692
        3⤵
        • Program crash
        PID:1088
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1672 -ip 1672
    1⤵
      PID:1136

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Hdagua.exe

      Filesize

      138KB

      MD5

      ee58d24ea7bcbfcb92aa56cd623764dd

      SHA1

      e96433741f75823d0963848d03f03afc1fa230ca

      SHA256

      d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f

      SHA512

      0b32bea0493ab7a0db20ef9f8f3d2bb47018740f58951dc831334e0382744431c3cbb7c0b55da8e722971132de9fdb1819d5496c44b9d5b7f5d1809485a2acb0

    • C:\Windows\Hdagua.exe

      Filesize

      138KB

      MD5

      ee58d24ea7bcbfcb92aa56cd623764dd

      SHA1

      e96433741f75823d0963848d03f03afc1fa230ca

      SHA256

      d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f

      SHA512

      0b32bea0493ab7a0db20ef9f8f3d2bb47018740f58951dc831334e0382744431c3cbb7c0b55da8e722971132de9fdb1819d5496c44b9d5b7f5d1809485a2acb0

    • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

      Filesize

      426B

      MD5

      41a8cb6e81a2360ecf2de889c65f53ed

      SHA1

      a792633c9507c25f01d09af872ed530aee80b6b1

      SHA256

      edf1dc23b7e99af24c0ededaf67eeb2e8ad232641aa20a9233948c60b4d3bc3e

      SHA512

      901e65513a97093876a22de2f7232df3b6f05e3bc20d0563af3d692900ec7ffc527d18cc54f70c5beb6e4fbea547e12e8b53cdb91ed79b65cb55ee73de35a205

    • memory/1672-143-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/1672-145-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/1672-147-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/5064-132-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/5064-135-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB

    • memory/5064-144-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/5064-146-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB