Analysis
-
max time kernel
45s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 14:38
Behavioral task
behavioral1
Sample
3f00c55554b99763558fb7ef011328ba1bce280742ae837b281434ea364eed75.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3f00c55554b99763558fb7ef011328ba1bce280742ae837b281434ea364eed75.exe
Resource
win10v2004-20220812-en
General
-
Target
3f00c55554b99763558fb7ef011328ba1bce280742ae837b281434ea364eed75.exe
-
Size
1.1MB
-
MD5
29fd7304c2deb95e281af769e24d149c
-
SHA1
4961dd942a61d1e74b227a8db08cd6ccb7330fff
-
SHA256
3f00c55554b99763558fb7ef011328ba1bce280742ae837b281434ea364eed75
-
SHA512
8eaf46c81a0f1027de551a0725d8f76a0ca6c9fa24a297450c132c2818d28def71f5dcd85915f15428565e15699d7bad78eb990f5f910c68f5bc08fed9018424
-
SSDEEP
24576:W9kY7vgEeJPq34ZTdQXtnqhz2cOmsRQsmjmPOIzAFMn0k9:W9kYuZTdAtS2lpSovcFS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1668 6c3ca4.exe -
resource yara_rule behavioral1/files/0x0008000000013473-55.dat upx behavioral1/files/0x0008000000013473-56.dat upx behavioral1/files/0x0008000000013473-58.dat upx behavioral1/files/0x0008000000013473-60.dat upx behavioral1/memory/1044-61-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/memory/1668-63-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/memory/1044-64-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/files/0x0008000000013473-66.dat upx behavioral1/files/0x0008000000013473-70.dat upx behavioral1/files/0x0008000000013473-69.dat upx behavioral1/files/0x0008000000013473-68.dat upx behavioral1/files/0x0008000000013473-67.dat upx behavioral1/files/0x0008000000013473-71.dat upx behavioral1/files/0x0008000000013473-72.dat upx -
Loads dropped DLL 9 IoCs
pid Process 1044 3f00c55554b99763558fb7ef011328ba1bce280742ae837b281434ea364eed75.exe 1044 3f00c55554b99763558fb7ef011328ba1bce280742ae837b281434ea364eed75.exe 396 WerFault.exe 396 WerFault.exe 396 WerFault.exe 396 WerFault.exe 396 WerFault.exe 396 WerFault.exe 396 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 396 1668 WerFault.exe 27 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 6c3ca4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde 6c3ca4.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1044 3f00c55554b99763558fb7ef011328ba1bce280742ae837b281434ea364eed75.exe 1044 3f00c55554b99763558fb7ef011328ba1bce280742ae837b281434ea364eed75.exe 1668 6c3ca4.exe 1668 6c3ca4.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1668 1044 3f00c55554b99763558fb7ef011328ba1bce280742ae837b281434ea364eed75.exe 27 PID 1044 wrote to memory of 1668 1044 3f00c55554b99763558fb7ef011328ba1bce280742ae837b281434ea364eed75.exe 27 PID 1044 wrote to memory of 1668 1044 3f00c55554b99763558fb7ef011328ba1bce280742ae837b281434ea364eed75.exe 27 PID 1044 wrote to memory of 1668 1044 3f00c55554b99763558fb7ef011328ba1bce280742ae837b281434ea364eed75.exe 27 PID 1668 wrote to memory of 396 1668 6c3ca4.exe 30 PID 1668 wrote to memory of 396 1668 6c3ca4.exe 30 PID 1668 wrote to memory of 396 1668 6c3ca4.exe 30 PID 1668 wrote to memory of 396 1668 6c3ca4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f00c55554b99763558fb7ef011328ba1bce280742ae837b281434ea364eed75.exe"C:\Users\Admin\AppData\Local\Temp\3f00c55554b99763558fb7ef011328ba1bce280742ae837b281434ea364eed75.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\6c3ca4.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\6c3ca4.exe 70934122⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 14003⤵
- Loads dropped DLL
- Program crash
PID:396
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5f32c09aca768e9a421748ae2549edbcb
SHA11412025b33f844846c12553b1c222ed57b7981a7
SHA2566201eaf57451b454576f67e7fc62be1145acc1a6dbb972f166a815c15e1ee396
SHA512bef56871078d5c7adf84e1eb2485624f6c8ef2b7f0b78f2fa8125605df563169f86bedb1280a42cda32e74b692306561f1403f44af5672d6097616ce9c3621e6
-
Filesize
1.1MB
MD5f32c09aca768e9a421748ae2549edbcb
SHA11412025b33f844846c12553b1c222ed57b7981a7
SHA2566201eaf57451b454576f67e7fc62be1145acc1a6dbb972f166a815c15e1ee396
SHA512bef56871078d5c7adf84e1eb2485624f6c8ef2b7f0b78f2fa8125605df563169f86bedb1280a42cda32e74b692306561f1403f44af5672d6097616ce9c3621e6
-
Filesize
1.1MB
MD5f32c09aca768e9a421748ae2549edbcb
SHA11412025b33f844846c12553b1c222ed57b7981a7
SHA2566201eaf57451b454576f67e7fc62be1145acc1a6dbb972f166a815c15e1ee396
SHA512bef56871078d5c7adf84e1eb2485624f6c8ef2b7f0b78f2fa8125605df563169f86bedb1280a42cda32e74b692306561f1403f44af5672d6097616ce9c3621e6
-
Filesize
1.1MB
MD5f32c09aca768e9a421748ae2549edbcb
SHA11412025b33f844846c12553b1c222ed57b7981a7
SHA2566201eaf57451b454576f67e7fc62be1145acc1a6dbb972f166a815c15e1ee396
SHA512bef56871078d5c7adf84e1eb2485624f6c8ef2b7f0b78f2fa8125605df563169f86bedb1280a42cda32e74b692306561f1403f44af5672d6097616ce9c3621e6
-
Filesize
1.1MB
MD5f32c09aca768e9a421748ae2549edbcb
SHA11412025b33f844846c12553b1c222ed57b7981a7
SHA2566201eaf57451b454576f67e7fc62be1145acc1a6dbb972f166a815c15e1ee396
SHA512bef56871078d5c7adf84e1eb2485624f6c8ef2b7f0b78f2fa8125605df563169f86bedb1280a42cda32e74b692306561f1403f44af5672d6097616ce9c3621e6
-
Filesize
1.1MB
MD5f32c09aca768e9a421748ae2549edbcb
SHA11412025b33f844846c12553b1c222ed57b7981a7
SHA2566201eaf57451b454576f67e7fc62be1145acc1a6dbb972f166a815c15e1ee396
SHA512bef56871078d5c7adf84e1eb2485624f6c8ef2b7f0b78f2fa8125605df563169f86bedb1280a42cda32e74b692306561f1403f44af5672d6097616ce9c3621e6
-
Filesize
1.1MB
MD5f32c09aca768e9a421748ae2549edbcb
SHA11412025b33f844846c12553b1c222ed57b7981a7
SHA2566201eaf57451b454576f67e7fc62be1145acc1a6dbb972f166a815c15e1ee396
SHA512bef56871078d5c7adf84e1eb2485624f6c8ef2b7f0b78f2fa8125605df563169f86bedb1280a42cda32e74b692306561f1403f44af5672d6097616ce9c3621e6
-
Filesize
1.1MB
MD5f32c09aca768e9a421748ae2549edbcb
SHA11412025b33f844846c12553b1c222ed57b7981a7
SHA2566201eaf57451b454576f67e7fc62be1145acc1a6dbb972f166a815c15e1ee396
SHA512bef56871078d5c7adf84e1eb2485624f6c8ef2b7f0b78f2fa8125605df563169f86bedb1280a42cda32e74b692306561f1403f44af5672d6097616ce9c3621e6
-
Filesize
1.1MB
MD5f32c09aca768e9a421748ae2549edbcb
SHA11412025b33f844846c12553b1c222ed57b7981a7
SHA2566201eaf57451b454576f67e7fc62be1145acc1a6dbb972f166a815c15e1ee396
SHA512bef56871078d5c7adf84e1eb2485624f6c8ef2b7f0b78f2fa8125605df563169f86bedb1280a42cda32e74b692306561f1403f44af5672d6097616ce9c3621e6
-
Filesize
1.1MB
MD5f32c09aca768e9a421748ae2549edbcb
SHA11412025b33f844846c12553b1c222ed57b7981a7
SHA2566201eaf57451b454576f67e7fc62be1145acc1a6dbb972f166a815c15e1ee396
SHA512bef56871078d5c7adf84e1eb2485624f6c8ef2b7f0b78f2fa8125605df563169f86bedb1280a42cda32e74b692306561f1403f44af5672d6097616ce9c3621e6
-
Filesize
1.1MB
MD5f32c09aca768e9a421748ae2549edbcb
SHA11412025b33f844846c12553b1c222ed57b7981a7
SHA2566201eaf57451b454576f67e7fc62be1145acc1a6dbb972f166a815c15e1ee396
SHA512bef56871078d5c7adf84e1eb2485624f6c8ef2b7f0b78f2fa8125605df563169f86bedb1280a42cda32e74b692306561f1403f44af5672d6097616ce9c3621e6