Analysis
-
max time kernel
32s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4.exe
Resource
win7-20220812-en
General
-
Target
082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4.exe
-
Size
551KB
-
MD5
6d04636d925e6a6a464155c5f925a97e
-
SHA1
01163dd2e3d9c93222111210d6c26b80936cf203
-
SHA256
082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4
-
SHA512
993403fc3b1d988a71c1f37d78bf9f08b12791f53ee30748a2e43addc47da3e225bf3fa8176547f8aba17366462afebef2f70df184ddbc7a94410b86a75dcc9b
-
SSDEEP
12288:Da0B7CNn8+P7hGxcKZgjiOc2OHaZxw+iqI4bqCOfFB/P:Dj7G8WocKZpKO6ZxwqTeCa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1976 082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 1792 082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4.exe 1792 082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4.exe 1076 WerFault.exe 1076 WerFault.exe 1076 WerFault.exe 1076 WerFault.exe 1076 WerFault.exe 1076 WerFault.exe 1076 WerFault.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1784 1792 WerFault.exe 12 1076 1976 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1976 1792 082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4.exe 28 PID 1792 wrote to memory of 1976 1792 082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4.exe 28 PID 1792 wrote to memory of 1976 1792 082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4.exe 28 PID 1792 wrote to memory of 1976 1792 082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4.exe 28 PID 1976 wrote to memory of 1076 1976 082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exe 30 PID 1976 wrote to memory of 1076 1976 082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exe 30 PID 1976 wrote to memory of 1076 1976 082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exe 30 PID 1976 wrote to memory of 1076 1976 082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exe 30 PID 1792 wrote to memory of 1784 1792 082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4.exe 29 PID 1792 wrote to memory of 1784 1792 082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4.exe 29 PID 1792 wrote to memory of 1784 1792 082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4.exe 29 PID 1792 wrote to memory of 1784 1792 082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4.exe"C:\Users\Admin\AppData\Local\Temp\082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exeC:\Users\Admin\AppData\Local\Temp\082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 1003⤵
- Loads dropped DLL
- Program crash
PID:1076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 1002⤵
- Program crash
PID:1784
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exe
Filesize274KB
MD549b9a6c4f6ae10b5e5a4c5874968e5ac
SHA1b8e4e1d18c15034810768dd9efc29246e480558d
SHA256e08bb4bce9aade77964f0e7eba61e63e70758ae580a709b78bfe3125edbba9d8
SHA5128cf2eaeadc995492d9255638a9722172f133638148902e8126dd551d2c2000e2b5bacc06801063b8940e3260b518acc385078b63dd7f5d3e86a9a38c07aa743c
-
\Users\Admin\AppData\Local\Temp\082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exe
Filesize274KB
MD549b9a6c4f6ae10b5e5a4c5874968e5ac
SHA1b8e4e1d18c15034810768dd9efc29246e480558d
SHA256e08bb4bce9aade77964f0e7eba61e63e70758ae580a709b78bfe3125edbba9d8
SHA5128cf2eaeadc995492d9255638a9722172f133638148902e8126dd551d2c2000e2b5bacc06801063b8940e3260b518acc385078b63dd7f5d3e86a9a38c07aa743c
-
\Users\Admin\AppData\Local\Temp\082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exe
Filesize274KB
MD549b9a6c4f6ae10b5e5a4c5874968e5ac
SHA1b8e4e1d18c15034810768dd9efc29246e480558d
SHA256e08bb4bce9aade77964f0e7eba61e63e70758ae580a709b78bfe3125edbba9d8
SHA5128cf2eaeadc995492d9255638a9722172f133638148902e8126dd551d2c2000e2b5bacc06801063b8940e3260b518acc385078b63dd7f5d3e86a9a38c07aa743c
-
\Users\Admin\AppData\Local\Temp\082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exe
Filesize274KB
MD549b9a6c4f6ae10b5e5a4c5874968e5ac
SHA1b8e4e1d18c15034810768dd9efc29246e480558d
SHA256e08bb4bce9aade77964f0e7eba61e63e70758ae580a709b78bfe3125edbba9d8
SHA5128cf2eaeadc995492d9255638a9722172f133638148902e8126dd551d2c2000e2b5bacc06801063b8940e3260b518acc385078b63dd7f5d3e86a9a38c07aa743c
-
\Users\Admin\AppData\Local\Temp\082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exe
Filesize274KB
MD549b9a6c4f6ae10b5e5a4c5874968e5ac
SHA1b8e4e1d18c15034810768dd9efc29246e480558d
SHA256e08bb4bce9aade77964f0e7eba61e63e70758ae580a709b78bfe3125edbba9d8
SHA5128cf2eaeadc995492d9255638a9722172f133638148902e8126dd551d2c2000e2b5bacc06801063b8940e3260b518acc385078b63dd7f5d3e86a9a38c07aa743c
-
\Users\Admin\AppData\Local\Temp\082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exe
Filesize274KB
MD549b9a6c4f6ae10b5e5a4c5874968e5ac
SHA1b8e4e1d18c15034810768dd9efc29246e480558d
SHA256e08bb4bce9aade77964f0e7eba61e63e70758ae580a709b78bfe3125edbba9d8
SHA5128cf2eaeadc995492d9255638a9722172f133638148902e8126dd551d2c2000e2b5bacc06801063b8940e3260b518acc385078b63dd7f5d3e86a9a38c07aa743c
-
\Users\Admin\AppData\Local\Temp\082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exe
Filesize274KB
MD549b9a6c4f6ae10b5e5a4c5874968e5ac
SHA1b8e4e1d18c15034810768dd9efc29246e480558d
SHA256e08bb4bce9aade77964f0e7eba61e63e70758ae580a709b78bfe3125edbba9d8
SHA5128cf2eaeadc995492d9255638a9722172f133638148902e8126dd551d2c2000e2b5bacc06801063b8940e3260b518acc385078b63dd7f5d3e86a9a38c07aa743c
-
\Users\Admin\AppData\Local\Temp\082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exe
Filesize274KB
MD549b9a6c4f6ae10b5e5a4c5874968e5ac
SHA1b8e4e1d18c15034810768dd9efc29246e480558d
SHA256e08bb4bce9aade77964f0e7eba61e63e70758ae580a709b78bfe3125edbba9d8
SHA5128cf2eaeadc995492d9255638a9722172f133638148902e8126dd551d2c2000e2b5bacc06801063b8940e3260b518acc385078b63dd7f5d3e86a9a38c07aa743c
-
\Users\Admin\AppData\Local\Temp\082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exe
Filesize274KB
MD549b9a6c4f6ae10b5e5a4c5874968e5ac
SHA1b8e4e1d18c15034810768dd9efc29246e480558d
SHA256e08bb4bce9aade77964f0e7eba61e63e70758ae580a709b78bfe3125edbba9d8
SHA5128cf2eaeadc995492d9255638a9722172f133638148902e8126dd551d2c2000e2b5bacc06801063b8940e3260b518acc385078b63dd7f5d3e86a9a38c07aa743c
-
\Users\Admin\AppData\Local\Temp\082e4c94c687521f163522b237a529489394cc9d7c7b542ec15de1b496054ea4mgr.exe
Filesize274KB
MD549b9a6c4f6ae10b5e5a4c5874968e5ac
SHA1b8e4e1d18c15034810768dd9efc29246e480558d
SHA256e08bb4bce9aade77964f0e7eba61e63e70758ae580a709b78bfe3125edbba9d8
SHA5128cf2eaeadc995492d9255638a9722172f133638148902e8126dd551d2c2000e2b5bacc06801063b8940e3260b518acc385078b63dd7f5d3e86a9a38c07aa743c