Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06.exe
Resource
win7-20220901-en
General
-
Target
9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06.exe
-
Size
289KB
-
MD5
0d1bd79f464e59961c35f6d7088c8436
-
SHA1
d23248d708ae44c91002572f090108e3c66e7487
-
SHA256
9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06
-
SHA512
0dcf6d1dd2363c34aea81cd556ed63065aad982c9a27ff9983c277cbffc547900fb4127c4c436b70197d26b745528b9afbea7ee3b3179d9d65988a6cd0007eb2
-
SSDEEP
6144:5Ga2IKa1hZPTJ0rLTvBKVKZ3QrLA5Qan8:4i1z2rLbBhQfMf8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4876 9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06mgr.exe 4928 9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06mgrmgr.exe -
resource yara_rule behavioral2/memory/4872-141-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4928-143-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4876-142-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 4928 9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06mgrmgr.exe 4876 9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06mgr.exe 4872 9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 2624 4928 WerFault.exe 82 1556 4876 WerFault.exe 81 2184 4872 WerFault.exe 80 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4872 wrote to memory of 4876 4872 9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06.exe 81 PID 4872 wrote to memory of 4876 4872 9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06.exe 81 PID 4872 wrote to memory of 4876 4872 9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06.exe 81 PID 4876 wrote to memory of 4928 4876 9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06mgr.exe 82 PID 4876 wrote to memory of 4928 4876 9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06mgr.exe 82 PID 4876 wrote to memory of 4928 4876 9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06mgr.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06.exe"C:\Users\Admin\AppData\Local\Temp\9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06mgr.exeC:\Users\Admin\AppData\Local\Temp\9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06mgr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06mgrmgr.exeC:\Users\Admin\AppData\Local\Temp\9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06mgrmgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 101764⤵
- Program crash
PID:2624
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 101843⤵
- Program crash
PID:1556
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 101842⤵
- Program crash
PID:2184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4876 -ip 48761⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4928 -ip 49281⤵PID:1684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4872 -ip 48721⤵PID:1664
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06mgr.exe
Filesize191KB
MD5f4380f6318e71d4596657ce83daf0014
SHA1c07fc57d337936faa228c7c44029e6086d466b07
SHA256152285357d6f7e14f4367fa2b295fabe5cd337215ef13fa3eb5cb0ad583e73fd
SHA51220c0bd8c84dbacf3f30e5f32dd39b39da6d4fa1ac3059ffcf3ae971384a1b1489ad3853ab1e1f46f93da0d11d9d0990e41983371f08af8de14940a922db3df0f
-
C:\Users\Admin\AppData\Local\Temp\9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06mgr.exe
Filesize191KB
MD5f4380f6318e71d4596657ce83daf0014
SHA1c07fc57d337936faa228c7c44029e6086d466b07
SHA256152285357d6f7e14f4367fa2b295fabe5cd337215ef13fa3eb5cb0ad583e73fd
SHA51220c0bd8c84dbacf3f30e5f32dd39b39da6d4fa1ac3059ffcf3ae971384a1b1489ad3853ab1e1f46f93da0d11d9d0990e41983371f08af8de14940a922db3df0f
-
C:\Users\Admin\AppData\Local\Temp\9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06mgrmgr.exe
Filesize94KB
MD55c8b2f1499f748bc9175df521ccfb94d
SHA11586cdfdf987d3d10cd85b142f7020f8e656b693
SHA2561a37e324b3de62bf0fdd1209f5cc286b399f22b5ed4cecc19a59183ba626d9b0
SHA512c72561bd4b22f8f36c9aa0df33f1d8c4f9197f80fe8a4c1566d9a62409dc415492d689d6628fb50d96d94652b4ae6295c2314924ce04de8cbb0c433fc7797d9b
-
C:\Users\Admin\AppData\Local\Temp\9bac8e1e755f20031d9b19e24f6c76eb50aaf8978fefa06713849b76c9217a06mgrmgr.exe
Filesize94KB
MD55c8b2f1499f748bc9175df521ccfb94d
SHA11586cdfdf987d3d10cd85b142f7020f8e656b693
SHA2561a37e324b3de62bf0fdd1209f5cc286b399f22b5ed4cecc19a59183ba626d9b0
SHA512c72561bd4b22f8f36c9aa0df33f1d8c4f9197f80fe8a4c1566d9a62409dc415492d689d6628fb50d96d94652b4ae6295c2314924ce04de8cbb0c433fc7797d9b
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219