Analysis
-
max time kernel
180s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
8c93ec515f5e0ea1f9f6bd9e3615f7a131148fa4ec7daac02c07692235c3507b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c93ec515f5e0ea1f9f6bd9e3615f7a131148fa4ec7daac02c07692235c3507b.exe
Resource
win10v2004-20220812-en
General
-
Target
8c93ec515f5e0ea1f9f6bd9e3615f7a131148fa4ec7daac02c07692235c3507b.exe
-
Size
368KB
-
MD5
800fdbe40abeff30d2557282c30ab930
-
SHA1
cbfe198b3b60a57a58b0d6013e6c4daaca971ae0
-
SHA256
8c93ec515f5e0ea1f9f6bd9e3615f7a131148fa4ec7daac02c07692235c3507b
-
SHA512
df665a2b84ad7b2e64ff994466c27dd27a562426c1e3414559a55e27efbf0c28bf8da646522b8af050bc7146dc54e439351e0dae784311863e4caff79fd96306
-
SSDEEP
6144:AOTeHI8HiL7+f5EJy8BzVmAGB2U+ecrDob2AbNPAh0Bk5N:jeoGiLaQJBzVmAz/oiAbNPqem
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4452 8c93ec515f5e0ea1f9f6bd9e3615f7a131148fa4ec7daac02c07692235c3507bmgr.exe -
resource yara_rule behavioral2/memory/4452-138-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral2/memory/4636-139-0x0000000000400000-0x0000000000460000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 4636 8c93ec515f5e0ea1f9f6bd9e3615f7a131148fa4ec7daac02c07692235c3507b.exe 4452 8c93ec515f5e0ea1f9f6bd9e3615f7a131148fa4ec7daac02c07692235c3507bmgr.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3400 4636 WerFault.exe 80 4180 4452 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4452 4636 8c93ec515f5e0ea1f9f6bd9e3615f7a131148fa4ec7daac02c07692235c3507b.exe 83 PID 4636 wrote to memory of 4452 4636 8c93ec515f5e0ea1f9f6bd9e3615f7a131148fa4ec7daac02c07692235c3507b.exe 83 PID 4636 wrote to memory of 4452 4636 8c93ec515f5e0ea1f9f6bd9e3615f7a131148fa4ec7daac02c07692235c3507b.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c93ec515f5e0ea1f9f6bd9e3615f7a131148fa4ec7daac02c07692235c3507b.exe"C:\Users\Admin\AppData\Local\Temp\8c93ec515f5e0ea1f9f6bd9e3615f7a131148fa4ec7daac02c07692235c3507b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\8c93ec515f5e0ea1f9f6bd9e3615f7a131148fa4ec7daac02c07692235c3507bmgr.exeC:\Users\Admin\AppData\Local\Temp\8c93ec515f5e0ea1f9f6bd9e3615f7a131148fa4ec7daac02c07692235c3507bmgr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 4883⤵
- Program crash
PID:4180
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 4882⤵
- Program crash
PID:3400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4636 -ip 46361⤵PID:4232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4452 -ip 44521⤵PID:2768
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8c93ec515f5e0ea1f9f6bd9e3615f7a131148fa4ec7daac02c07692235c3507bmgr.exe
Filesize183KB
MD53cf7da6d3581a8a263ddd900228909c6
SHA12c2ded114379ffba2581d3e01370e242e7b60692
SHA25684933c20036d1c9998c4568de47ddb402141b190c33f97d556159cc434da06f0
SHA5121abbc84c1f40cef750e7a6d8a14860046e98a607189098ff1bd9c7d62b78ed7cd452e6e631fcdc1e0740851129a58e568ac12dd375e0767d7a75c08ddaa9c508
-
C:\Users\Admin\AppData\Local\Temp\8c93ec515f5e0ea1f9f6bd9e3615f7a131148fa4ec7daac02c07692235c3507bmgr.exe
Filesize183KB
MD53cf7da6d3581a8a263ddd900228909c6
SHA12c2ded114379ffba2581d3e01370e242e7b60692
SHA25684933c20036d1c9998c4568de47ddb402141b190c33f97d556159cc434da06f0
SHA5121abbc84c1f40cef750e7a6d8a14860046e98a607189098ff1bd9c7d62b78ed7cd452e6e631fcdc1e0740851129a58e568ac12dd375e0767d7a75c08ddaa9c508
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219