Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe
Resource
win10v2004-20220812-en
General
-
Target
8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe
-
Size
412KB
-
MD5
2e34a936de1f285b71403cff1118ebf8
-
SHA1
395e40c8fb0b304deb5c62f0a412f972047ef9e3
-
SHA256
8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c
-
SHA512
7353e6f7dd10c9f9e35d338d47d0c28d12668a23a45bfaeade43a87eba1cc0058107b2bcf1e95d5316231723ca93668148a32e19b98e0f8bd5eea254cd64614d
-
SSDEEP
6144:C1IrQ+K8JMLl0We88qdbZsmLEsq1gMMkcz410GoK2ZIlfkqbtx4JM7cC:C1IrQ+K8JWzXbJucWgDHzi0VZMfLb/I
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4976 iL12402KmCcN12402.exe -
resource yara_rule behavioral2/memory/1236-133-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral2/memory/4976-137-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral2/memory/1236-138-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral2/memory/4976-139-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral2/memory/1236-140-0x0000000000400000-0x00000000004D7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\iL12402KmCcN12402 = "C:\\iL12402KmCcN12402\\iL12402KmCcN12402.exe" iL12402KmCcN12402.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 516 1236 WerFault.exe 80 4380 4976 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 4976 iL12402KmCcN12402.exe 4976 iL12402KmCcN12402.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 4976 iL12402KmCcN12402.exe 4976 iL12402KmCcN12402.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe Token: SeDebugPrivilege 4976 iL12402KmCcN12402.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4976 iL12402KmCcN12402.exe 4976 iL12402KmCcN12402.exe 4976 iL12402KmCcN12402.exe 4976 iL12402KmCcN12402.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4976 iL12402KmCcN12402.exe 4976 iL12402KmCcN12402.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1236 wrote to memory of 4976 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 85 PID 1236 wrote to memory of 4976 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 85 PID 1236 wrote to memory of 4976 1236 8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe"C:\Users\Admin\AppData\Local\Temp\8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 8962⤵
- Program crash
PID:516
-
-
C:\iL12402KmCcN12402\iL12402KmCcN12402.exe"\iL12402KmCcN12402\iL12402KmCcN12402.exe" "C:\Users\Admin\AppData\Local\Temp\8fdf09839d24d022c07824057ba5ca4430c9c728decb31a6b83ba395ba38396c.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 8963⤵
- Program crash
PID:4380
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1236 -ip 12361⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4976 -ip 49761⤵PID:4044
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD580452f380f0690d201dbda37c9f2bba2
SHA1879b0c9d08ac5bf4549388242621087d13e9f55c
SHA256e72ca857aaa206cc3f0adcbd13e462b4225daa53ebd698ec98569ac501c56a46
SHA512f391c0039db96679a1303296e13059e167557d72f84eeae929f0a228790d7841f2edf9b5cd06adde801ec592bee6b4cc5f90cd3de9cfad7478b1f7c630298e02
-
Filesize
412KB
MD580452f380f0690d201dbda37c9f2bba2
SHA1879b0c9d08ac5bf4549388242621087d13e9f55c
SHA256e72ca857aaa206cc3f0adcbd13e462b4225daa53ebd698ec98569ac501c56a46
SHA512f391c0039db96679a1303296e13059e167557d72f84eeae929f0a228790d7841f2edf9b5cd06adde801ec592bee6b4cc5f90cd3de9cfad7478b1f7c630298e02