Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 20:39
Static task
static1
Behavioral task
behavioral1
Sample
cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30a.exe
Resource
win7-20220901-en
General
-
Target
cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30a.exe
-
Size
168KB
-
MD5
068439c9580a9e79614a3369bc5f90b6
-
SHA1
a26e914e13a3b763063426dffdfca78f81d13860
-
SHA256
cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30a
-
SHA512
9d20ff0d3142eab99fe8708bc96896549c1c78df2ad2199823ec7ef895045cbe981bec83d3c94c94ba2fa5e860d7735f2de6d1ca6c58d562557dc6c094c23ae4
-
SSDEEP
3072:bIJUzBZnvulqw5cBPARA8+uCeQL+GrqaieHzQqr1I+qy6:bIJ4BNYFgPA2ue+Gr+OzQom+qT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1224 cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exe -
Loads dropped DLL 9 IoCs
pid Process 1416 cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30a.exe 1416 cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30a.exe 1788 WerFault.exe 1788 WerFault.exe 1788 WerFault.exe 1788 WerFault.exe 1788 WerFault.exe 1788 WerFault.exe 1788 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1788 1224 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1224 1416 cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30a.exe 27 PID 1416 wrote to memory of 1224 1416 cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30a.exe 27 PID 1416 wrote to memory of 1224 1416 cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30a.exe 27 PID 1416 wrote to memory of 1224 1416 cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30a.exe 27 PID 1224 wrote to memory of 1788 1224 cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exe 28 PID 1224 wrote to memory of 1788 1224 cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exe 28 PID 1224 wrote to memory of 1788 1224 cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exe 28 PID 1224 wrote to memory of 1788 1224 cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30a.exe"C:\Users\Admin\AppData\Local\Temp\cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exeC:\Users\Admin\AppData\Local\Temp\cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 923⤵
- Loads dropped DLL
- Program crash
PID:1788
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exe
Filesize60KB
MD5cd963c64ad0bea4ca85a4819f6eefed1
SHA1d9cd6316cf3c6ce5ceec9694c2debc7b7981775f
SHA25633c4b715dc8b183dff9aac65cc42c7f2c70658580b8e3d449878251482a5d906
SHA512f7cd12c57eff3acf7c89b0e7b55dfa81623618a65d6c49b490c199cfe63ae9e858f2681c8ef1425d1e4b25f7b0bbd6d4a9d9788956c23f52fece3d5d79b5907e
-
\Users\Admin\AppData\Local\Temp\cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exe
Filesize60KB
MD5cd963c64ad0bea4ca85a4819f6eefed1
SHA1d9cd6316cf3c6ce5ceec9694c2debc7b7981775f
SHA25633c4b715dc8b183dff9aac65cc42c7f2c70658580b8e3d449878251482a5d906
SHA512f7cd12c57eff3acf7c89b0e7b55dfa81623618a65d6c49b490c199cfe63ae9e858f2681c8ef1425d1e4b25f7b0bbd6d4a9d9788956c23f52fece3d5d79b5907e
-
\Users\Admin\AppData\Local\Temp\cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exe
Filesize60KB
MD5cd963c64ad0bea4ca85a4819f6eefed1
SHA1d9cd6316cf3c6ce5ceec9694c2debc7b7981775f
SHA25633c4b715dc8b183dff9aac65cc42c7f2c70658580b8e3d449878251482a5d906
SHA512f7cd12c57eff3acf7c89b0e7b55dfa81623618a65d6c49b490c199cfe63ae9e858f2681c8ef1425d1e4b25f7b0bbd6d4a9d9788956c23f52fece3d5d79b5907e
-
\Users\Admin\AppData\Local\Temp\cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exe
Filesize60KB
MD5cd963c64ad0bea4ca85a4819f6eefed1
SHA1d9cd6316cf3c6ce5ceec9694c2debc7b7981775f
SHA25633c4b715dc8b183dff9aac65cc42c7f2c70658580b8e3d449878251482a5d906
SHA512f7cd12c57eff3acf7c89b0e7b55dfa81623618a65d6c49b490c199cfe63ae9e858f2681c8ef1425d1e4b25f7b0bbd6d4a9d9788956c23f52fece3d5d79b5907e
-
\Users\Admin\AppData\Local\Temp\cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exe
Filesize60KB
MD5cd963c64ad0bea4ca85a4819f6eefed1
SHA1d9cd6316cf3c6ce5ceec9694c2debc7b7981775f
SHA25633c4b715dc8b183dff9aac65cc42c7f2c70658580b8e3d449878251482a5d906
SHA512f7cd12c57eff3acf7c89b0e7b55dfa81623618a65d6c49b490c199cfe63ae9e858f2681c8ef1425d1e4b25f7b0bbd6d4a9d9788956c23f52fece3d5d79b5907e
-
\Users\Admin\AppData\Local\Temp\cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exe
Filesize60KB
MD5cd963c64ad0bea4ca85a4819f6eefed1
SHA1d9cd6316cf3c6ce5ceec9694c2debc7b7981775f
SHA25633c4b715dc8b183dff9aac65cc42c7f2c70658580b8e3d449878251482a5d906
SHA512f7cd12c57eff3acf7c89b0e7b55dfa81623618a65d6c49b490c199cfe63ae9e858f2681c8ef1425d1e4b25f7b0bbd6d4a9d9788956c23f52fece3d5d79b5907e
-
\Users\Admin\AppData\Local\Temp\cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exe
Filesize60KB
MD5cd963c64ad0bea4ca85a4819f6eefed1
SHA1d9cd6316cf3c6ce5ceec9694c2debc7b7981775f
SHA25633c4b715dc8b183dff9aac65cc42c7f2c70658580b8e3d449878251482a5d906
SHA512f7cd12c57eff3acf7c89b0e7b55dfa81623618a65d6c49b490c199cfe63ae9e858f2681c8ef1425d1e4b25f7b0bbd6d4a9d9788956c23f52fece3d5d79b5907e
-
\Users\Admin\AppData\Local\Temp\cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exe
Filesize60KB
MD5cd963c64ad0bea4ca85a4819f6eefed1
SHA1d9cd6316cf3c6ce5ceec9694c2debc7b7981775f
SHA25633c4b715dc8b183dff9aac65cc42c7f2c70658580b8e3d449878251482a5d906
SHA512f7cd12c57eff3acf7c89b0e7b55dfa81623618a65d6c49b490c199cfe63ae9e858f2681c8ef1425d1e4b25f7b0bbd6d4a9d9788956c23f52fece3d5d79b5907e
-
\Users\Admin\AppData\Local\Temp\cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exe
Filesize60KB
MD5cd963c64ad0bea4ca85a4819f6eefed1
SHA1d9cd6316cf3c6ce5ceec9694c2debc7b7981775f
SHA25633c4b715dc8b183dff9aac65cc42c7f2c70658580b8e3d449878251482a5d906
SHA512f7cd12c57eff3acf7c89b0e7b55dfa81623618a65d6c49b490c199cfe63ae9e858f2681c8ef1425d1e4b25f7b0bbd6d4a9d9788956c23f52fece3d5d79b5907e
-
\Users\Admin\AppData\Local\Temp\cabe98852852377278d4b8cb15842c7c2be2a4475e88484a25c57a3ca452a30amgr.exe
Filesize60KB
MD5cd963c64ad0bea4ca85a4819f6eefed1
SHA1d9cd6316cf3c6ce5ceec9694c2debc7b7981775f
SHA25633c4b715dc8b183dff9aac65cc42c7f2c70658580b8e3d449878251482a5d906
SHA512f7cd12c57eff3acf7c89b0e7b55dfa81623618a65d6c49b490c199cfe63ae9e858f2681c8ef1425d1e4b25f7b0bbd6d4a9d9788956c23f52fece3d5d79b5907e