Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 11:47
Behavioral task
behavioral1
Sample
d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f.exe
Resource
win10v2004-20220812-en
General
-
Target
d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f.exe
-
Size
138KB
-
MD5
ee58d24ea7bcbfcb92aa56cd623764dd
-
SHA1
e96433741f75823d0963848d03f03afc1fa230ca
-
SHA256
d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f
-
SHA512
0b32bea0493ab7a0db20ef9f8f3d2bb47018740f58951dc831334e0382744431c3cbb7c0b55da8e722971132de9fdb1819d5496c44b9d5b7f5d1809485a2acb0
-
SSDEEP
3072:6JB9wBaSfsQV9+xlOLGaUQ/eHVR5+PZVbqo:Y0eQV9+xsLGaU9/gP3O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1672 Hdagua.exe -
resource yara_rule behavioral2/memory/5064-132-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/files/0x0006000000022e61-137.dat upx behavioral2/files/0x0006000000022e61-138.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Hdagua.exe d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Hdagua.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Hdagua.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f.exe File created C:\Windows\Hdagua.exe d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1088 1672 WerFault.exe 81 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main Hdagua.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe 1672 Hdagua.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5064 wrote to memory of 1672 5064 d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f.exe 81 PID 5064 wrote to memory of 1672 5064 d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f.exe 81 PID 5064 wrote to memory of 1672 5064 d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f.exe"C:\Users\Admin\AppData\Local\Temp\d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\Hdagua.exeC:\Windows\Hdagua.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 6923⤵
- Program crash
PID:1088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1672 -ip 16721⤵PID:1136
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD5ee58d24ea7bcbfcb92aa56cd623764dd
SHA1e96433741f75823d0963848d03f03afc1fa230ca
SHA256d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f
SHA5120b32bea0493ab7a0db20ef9f8f3d2bb47018740f58951dc831334e0382744431c3cbb7c0b55da8e722971132de9fdb1819d5496c44b9d5b7f5d1809485a2acb0
-
Filesize
138KB
MD5ee58d24ea7bcbfcb92aa56cd623764dd
SHA1e96433741f75823d0963848d03f03afc1fa230ca
SHA256d4707b693537095c63ffc90b80370aa7ef4b624ae59512b0695d08d5d0e04d1f
SHA5120b32bea0493ab7a0db20ef9f8f3d2bb47018740f58951dc831334e0382744431c3cbb7c0b55da8e722971132de9fdb1819d5496c44b9d5b7f5d1809485a2acb0
-
Filesize
426B
MD541a8cb6e81a2360ecf2de889c65f53ed
SHA1a792633c9507c25f01d09af872ed530aee80b6b1
SHA256edf1dc23b7e99af24c0ededaf67eeb2e8ad232641aa20a9233948c60b4d3bc3e
SHA512901e65513a97093876a22de2f7232df3b6f05e3bc20d0563af3d692900ec7ffc527d18cc54f70c5beb6e4fbea547e12e8b53cdb91ed79b65cb55ee73de35a205