Analysis
-
max time kernel
92s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 17:06
Behavioral task
behavioral1
Sample
5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe
Resource
win10v2004-20220812-en
General
-
Target
5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe
-
Size
225KB
-
MD5
822161a0374d3565cbc5ea53de075b15
-
SHA1
ec86af1efb1c434702d1cb26702a099423ad4cdc
-
SHA256
5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6
-
SHA512
4748bf9d0d7d89918dde8cd89ea9873d2cccdeb6966d7795428e0f3beaa02bb2a5f8674f7a3e4a121aa5fa736d508fd69b8f423f939891d2279c85e7306bba7f
-
SSDEEP
6144:Jsynggx/YFgcYvw05eAAm/cVAOMBUriKzQ:JLue/TAi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2204 Qfyjoa.exe -
resource yara_rule behavioral2/memory/1264-132-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0006000000022f6f-137.dat upx behavioral2/files/0x0006000000022f6f-138.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe File created C:\Windows\Qfyjoa.exe 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe File opened for modification C:\Windows\Qfyjoa.exe 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Qfyjoa.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Qfyjoa.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4060 2204 WerFault.exe 82 3180 1264 WerFault.exe 81 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main Qfyjoa.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 2204 Qfyjoa.exe 1264 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe 1264 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe 1264 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe 1264 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe 1264 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe 1264 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe 1264 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe 1264 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe 1264 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe 1264 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1264 wrote to memory of 2204 1264 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe 82 PID 1264 wrote to memory of 2204 1264 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe 82 PID 1264 wrote to memory of 2204 1264 5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe"C:\Users\Admin\AppData\Local\Temp\5dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\Qfyjoa.exeC:\Windows\Qfyjoa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 6763⤵
- Program crash
PID:4060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 7082⤵
- Program crash
PID:3180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2204 -ip 22041⤵PID:1320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1264 -ip 12641⤵PID:4640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD5822161a0374d3565cbc5ea53de075b15
SHA1ec86af1efb1c434702d1cb26702a099423ad4cdc
SHA2565dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6
SHA5124748bf9d0d7d89918dde8cd89ea9873d2cccdeb6966d7795428e0f3beaa02bb2a5f8674f7a3e4a121aa5fa736d508fd69b8f423f939891d2279c85e7306bba7f
-
Filesize
225KB
MD5822161a0374d3565cbc5ea53de075b15
SHA1ec86af1efb1c434702d1cb26702a099423ad4cdc
SHA2565dc7c3cf2b8fe0682059835fc23b88214e48a52933442c448ca5dda294d035f6
SHA5124748bf9d0d7d89918dde8cd89ea9873d2cccdeb6966d7795428e0f3beaa02bb2a5f8674f7a3e4a121aa5fa736d508fd69b8f423f939891d2279c85e7306bba7f
-
Filesize
426B
MD5d320a3c7424993866236adccef3e290b
SHA1374694d0b15cd7b02a7b546ef4d73445b03b770d
SHA2565997d2befa0909f570123527babee411753576e36a046a2e4b017053cf39022a
SHA51214513d989a1945157a5a83fb47877365b53bce49c4bb7f034a716d62bc708f67bb35b4ba9a70116ed03c2eaeff3d38862fc9b85a23aac59a33b2ade93edc4b63