Analysis
-
max time kernel
112s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 23:16
Static task
static1
Behavioral task
behavioral1
Sample
3abbf9cad996beb2a9e5598f2e2236769a604b5421b20d81111686a31bbb28ab.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3abbf9cad996beb2a9e5598f2e2236769a604b5421b20d81111686a31bbb28ab.exe
Resource
win10v2004-20220901-en
General
-
Target
3abbf9cad996beb2a9e5598f2e2236769a604b5421b20d81111686a31bbb28ab.exe
-
Size
483KB
-
MD5
922a7d95b242108cef387cd79d4d3a30
-
SHA1
4d1b63732bdb640d51949da03b0a9749cbf7f65d
-
SHA256
3abbf9cad996beb2a9e5598f2e2236769a604b5421b20d81111686a31bbb28ab
-
SHA512
2316cf1ab3b9d083e315760c99aae8e0cce6d40114b82a15de42af817bdb0007fd16148bb485456fe0437d2147498e2de2c484dadb87651f3c3ea78b10b80628
-
SSDEEP
12288:Ftoj3rLo3ZAZDbfAmDHLwgV4EPl5TrmszIryaj:Ej7VDbfA4Lwgbjk5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4264 3abbf9cad996beb2a9e5598f2e2236769a604b5421b20d81111686a31bbb28abmgr.exe -
resource yara_rule behavioral2/files/0x0006000000022e60-134.dat upx behavioral2/files/0x0006000000022e60-135.dat upx behavioral2/memory/4264-136-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 220 4264 WerFault.exe 81 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 636 3abbf9cad996beb2a9e5598f2e2236769a604b5421b20d81111686a31bbb28ab.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 636 wrote to memory of 4264 636 3abbf9cad996beb2a9e5598f2e2236769a604b5421b20d81111686a31bbb28ab.exe 81 PID 636 wrote to memory of 4264 636 3abbf9cad996beb2a9e5598f2e2236769a604b5421b20d81111686a31bbb28ab.exe 81 PID 636 wrote to memory of 4264 636 3abbf9cad996beb2a9e5598f2e2236769a604b5421b20d81111686a31bbb28ab.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\3abbf9cad996beb2a9e5598f2e2236769a604b5421b20d81111686a31bbb28ab.exe"C:\Users\Admin\AppData\Local\Temp\3abbf9cad996beb2a9e5598f2e2236769a604b5421b20d81111686a31bbb28ab.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\3abbf9cad996beb2a9e5598f2e2236769a604b5421b20d81111686a31bbb28abmgr.exeC:\Users\Admin\AppData\Local\Temp\3abbf9cad996beb2a9e5598f2e2236769a604b5421b20d81111686a31bbb28abmgr.exe2⤵
- Executes dropped EXE
PID:4264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 2603⤵
- Program crash
PID:220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4264 -ip 42641⤵PID:2184
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3abbf9cad996beb2a9e5598f2e2236769a604b5421b20d81111686a31bbb28abmgr.exe
Filesize105KB
MD593e4449dccbca737dc4f039ea053fa66
SHA18007d95f904b6872971ea5a9b9ad878281e50a88
SHA256d548fefa0b087af4a447f0eebf8af488a8943d1c0fc25cb11cdd9a0d0344ca62
SHA512e3360327b9c99415c7f49a1f3f118af89545f918e83c27145b389a22f99707dee7cc026b9177534caace586f5a8994cdb6ae87d87b0b0294e7bc9183413cc11d
-
C:\Users\Admin\AppData\Local\Temp\3abbf9cad996beb2a9e5598f2e2236769a604b5421b20d81111686a31bbb28abmgr.exe
Filesize105KB
MD593e4449dccbca737dc4f039ea053fa66
SHA18007d95f904b6872971ea5a9b9ad878281e50a88
SHA256d548fefa0b087af4a447f0eebf8af488a8943d1c0fc25cb11cdd9a0d0344ca62
SHA512e3360327b9c99415c7f49a1f3f118af89545f918e83c27145b389a22f99707dee7cc026b9177534caace586f5a8994cdb6ae87d87b0b0294e7bc9183413cc11d