Analysis
-
max time kernel
87s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 15:09
Behavioral task
behavioral1
Sample
153d3b648a3ac600d860bb4f816bd4a251daa0fa354f1797052c1c9afe74baf0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
153d3b648a3ac600d860bb4f816bd4a251daa0fa354f1797052c1c9afe74baf0.exe
Resource
win10v2004-20220812-en
General
-
Target
153d3b648a3ac600d860bb4f816bd4a251daa0fa354f1797052c1c9afe74baf0.exe
-
Size
1.1MB
-
MD5
63bdfd5090d443cdb861db3b24a094cb
-
SHA1
7323e23ced3f9fa9113acf97d4eb0aa3a0f2864b
-
SHA256
153d3b648a3ac600d860bb4f816bd4a251daa0fa354f1797052c1c9afe74baf0
-
SHA512
c1ddd89add763a9112b6d459037cedceeee75b5e81935a36ea492dc39ded99c1a43b161d4cce68a781a83e41a26c6943c43c252b9f99722dfa303f50fb14b381
-
SSDEEP
24576:W9kY7vgEeJPq34ZTdQXtnqhz2cOmsRQsmjmPOIzAFMn0k7:W9kYuZTdAtS2lpSovcFY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1900 6c8a75.exe -
resource yara_rule behavioral1/memory/1172-54-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/files/0x000a0000000122e0-56.dat upx behavioral1/files/0x000a0000000122e0-57.dat upx behavioral1/files/0x000a0000000122e0-59.dat upx behavioral1/files/0x000a0000000122e0-61.dat upx behavioral1/memory/1900-64-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/memory/1172-65-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/files/0x000a0000000122e0-67.dat upx behavioral1/files/0x000a0000000122e0-68.dat upx behavioral1/files/0x000a0000000122e0-69.dat upx behavioral1/files/0x000a0000000122e0-70.dat upx behavioral1/files/0x000a0000000122e0-72.dat upx behavioral1/files/0x000a0000000122e0-71.dat upx behavioral1/files/0x000a0000000122e0-73.dat upx -
Loads dropped DLL 9 IoCs
pid Process 1172 153d3b648a3ac600d860bb4f816bd4a251daa0fa354f1797052c1c9afe74baf0.exe 1172 153d3b648a3ac600d860bb4f816bd4a251daa0fa354f1797052c1c9afe74baf0.exe 864 WerFault.exe 864 WerFault.exe 864 WerFault.exe 864 WerFault.exe 864 WerFault.exe 864 WerFault.exe 864 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 864 1900 WerFault.exe 27 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 6c8a75.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 6c8a75.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1172 153d3b648a3ac600d860bb4f816bd4a251daa0fa354f1797052c1c9afe74baf0.exe 1172 153d3b648a3ac600d860bb4f816bd4a251daa0fa354f1797052c1c9afe74baf0.exe 1900 6c8a75.exe 1900 6c8a75.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1172 wrote to memory of 1900 1172 153d3b648a3ac600d860bb4f816bd4a251daa0fa354f1797052c1c9afe74baf0.exe 27 PID 1172 wrote to memory of 1900 1172 153d3b648a3ac600d860bb4f816bd4a251daa0fa354f1797052c1c9afe74baf0.exe 27 PID 1172 wrote to memory of 1900 1172 153d3b648a3ac600d860bb4f816bd4a251daa0fa354f1797052c1c9afe74baf0.exe 27 PID 1172 wrote to memory of 1900 1172 153d3b648a3ac600d860bb4f816bd4a251daa0fa354f1797052c1c9afe74baf0.exe 27 PID 1900 wrote to memory of 864 1900 6c8a75.exe 30 PID 1900 wrote to memory of 864 1900 6c8a75.exe 30 PID 1900 wrote to memory of 864 1900 6c8a75.exe 30 PID 1900 wrote to memory of 864 1900 6c8a75.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\153d3b648a3ac600d860bb4f816bd4a251daa0fa354f1797052c1c9afe74baf0.exe"C:\Users\Admin\AppData\Local\Temp\153d3b648a3ac600d860bb4f816bd4a251daa0fa354f1797052c1c9afe74baf0.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\6c8a75.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\6c8a75.exe 71133332⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 14683⤵
- Loads dropped DLL
- Program crash
PID:864
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD53c26695e7c1cee5acafa068936d8e0ee
SHA1160b2615aae6afb8e9c0aa3edb8d00c6319a4eca
SHA2568cf7b41120ba77d5074e5bbef644558b246eb040d37494dea6e4e2cd65b1c034
SHA5126974b7fd2ab0eb9b5ddcf57c4994d68a9a47d5bef7c9e649f1fb0a5437b6c0f7f61aed82d74e728b5fb99e4c23a43ee47fc9c785df4601ab9625d21cd2a5605b
-
Filesize
1.1MB
MD53c26695e7c1cee5acafa068936d8e0ee
SHA1160b2615aae6afb8e9c0aa3edb8d00c6319a4eca
SHA2568cf7b41120ba77d5074e5bbef644558b246eb040d37494dea6e4e2cd65b1c034
SHA5126974b7fd2ab0eb9b5ddcf57c4994d68a9a47d5bef7c9e649f1fb0a5437b6c0f7f61aed82d74e728b5fb99e4c23a43ee47fc9c785df4601ab9625d21cd2a5605b
-
Filesize
1.1MB
MD53c26695e7c1cee5acafa068936d8e0ee
SHA1160b2615aae6afb8e9c0aa3edb8d00c6319a4eca
SHA2568cf7b41120ba77d5074e5bbef644558b246eb040d37494dea6e4e2cd65b1c034
SHA5126974b7fd2ab0eb9b5ddcf57c4994d68a9a47d5bef7c9e649f1fb0a5437b6c0f7f61aed82d74e728b5fb99e4c23a43ee47fc9c785df4601ab9625d21cd2a5605b
-
Filesize
1.1MB
MD53c26695e7c1cee5acafa068936d8e0ee
SHA1160b2615aae6afb8e9c0aa3edb8d00c6319a4eca
SHA2568cf7b41120ba77d5074e5bbef644558b246eb040d37494dea6e4e2cd65b1c034
SHA5126974b7fd2ab0eb9b5ddcf57c4994d68a9a47d5bef7c9e649f1fb0a5437b6c0f7f61aed82d74e728b5fb99e4c23a43ee47fc9c785df4601ab9625d21cd2a5605b
-
Filesize
1.1MB
MD53c26695e7c1cee5acafa068936d8e0ee
SHA1160b2615aae6afb8e9c0aa3edb8d00c6319a4eca
SHA2568cf7b41120ba77d5074e5bbef644558b246eb040d37494dea6e4e2cd65b1c034
SHA5126974b7fd2ab0eb9b5ddcf57c4994d68a9a47d5bef7c9e649f1fb0a5437b6c0f7f61aed82d74e728b5fb99e4c23a43ee47fc9c785df4601ab9625d21cd2a5605b
-
Filesize
1.1MB
MD53c26695e7c1cee5acafa068936d8e0ee
SHA1160b2615aae6afb8e9c0aa3edb8d00c6319a4eca
SHA2568cf7b41120ba77d5074e5bbef644558b246eb040d37494dea6e4e2cd65b1c034
SHA5126974b7fd2ab0eb9b5ddcf57c4994d68a9a47d5bef7c9e649f1fb0a5437b6c0f7f61aed82d74e728b5fb99e4c23a43ee47fc9c785df4601ab9625d21cd2a5605b
-
Filesize
1.1MB
MD53c26695e7c1cee5acafa068936d8e0ee
SHA1160b2615aae6afb8e9c0aa3edb8d00c6319a4eca
SHA2568cf7b41120ba77d5074e5bbef644558b246eb040d37494dea6e4e2cd65b1c034
SHA5126974b7fd2ab0eb9b5ddcf57c4994d68a9a47d5bef7c9e649f1fb0a5437b6c0f7f61aed82d74e728b5fb99e4c23a43ee47fc9c785df4601ab9625d21cd2a5605b
-
Filesize
1.1MB
MD53c26695e7c1cee5acafa068936d8e0ee
SHA1160b2615aae6afb8e9c0aa3edb8d00c6319a4eca
SHA2568cf7b41120ba77d5074e5bbef644558b246eb040d37494dea6e4e2cd65b1c034
SHA5126974b7fd2ab0eb9b5ddcf57c4994d68a9a47d5bef7c9e649f1fb0a5437b6c0f7f61aed82d74e728b5fb99e4c23a43ee47fc9c785df4601ab9625d21cd2a5605b
-
Filesize
1.1MB
MD53c26695e7c1cee5acafa068936d8e0ee
SHA1160b2615aae6afb8e9c0aa3edb8d00c6319a4eca
SHA2568cf7b41120ba77d5074e5bbef644558b246eb040d37494dea6e4e2cd65b1c034
SHA5126974b7fd2ab0eb9b5ddcf57c4994d68a9a47d5bef7c9e649f1fb0a5437b6c0f7f61aed82d74e728b5fb99e4c23a43ee47fc9c785df4601ab9625d21cd2a5605b
-
Filesize
1.1MB
MD53c26695e7c1cee5acafa068936d8e0ee
SHA1160b2615aae6afb8e9c0aa3edb8d00c6319a4eca
SHA2568cf7b41120ba77d5074e5bbef644558b246eb040d37494dea6e4e2cd65b1c034
SHA5126974b7fd2ab0eb9b5ddcf57c4994d68a9a47d5bef7c9e649f1fb0a5437b6c0f7f61aed82d74e728b5fb99e4c23a43ee47fc9c785df4601ab9625d21cd2a5605b
-
Filesize
1.1MB
MD53c26695e7c1cee5acafa068936d8e0ee
SHA1160b2615aae6afb8e9c0aa3edb8d00c6319a4eca
SHA2568cf7b41120ba77d5074e5bbef644558b246eb040d37494dea6e4e2cd65b1c034
SHA5126974b7fd2ab0eb9b5ddcf57c4994d68a9a47d5bef7c9e649f1fb0a5437b6c0f7f61aed82d74e728b5fb99e4c23a43ee47fc9c785df4601ab9625d21cd2a5605b