Analysis
-
max time kernel
162s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 06:10
Behavioral task
behavioral1
Sample
98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe
Resource
win10v2004-20220812-en
General
-
Target
98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe
-
Size
205KB
-
MD5
1722ed342398e20d9b4c02290ed28ace
-
SHA1
b821e79711d1b3cc1d3b1584eacfed472d3d6853
-
SHA256
98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7
-
SHA512
8562ddd99405ba9edbef894470329690cc79de2d04e777611645bd3c0e96f840f8c2ba5722c58ef453a0f6e1f0df353f4b786039ba3b18612f74cf411c765489
-
SSDEEP
6144:WTmgzw8RTPbC55dXcnuUWzULEQIBS+eZ2G:ng0OPE9/zWtcSlM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3620 Lcicya.exe -
resource yara_rule behavioral2/memory/2548-132-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral2/files/0x0007000000022dfa-137.dat upx behavioral2/files/0x0007000000022dfa-138.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe File created C:\Windows\Lcicya.exe 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe File opened for modification C:\Windows\Lcicya.exe 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Lcicya.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Lcicya.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5108 3620 WerFault.exe 76 2832 2548 WerFault.exe 75 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main Lcicya.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 3620 Lcicya.exe 2548 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 2548 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 2548 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 2548 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 2548 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 2548 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 2548 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 2548 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 2548 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 2548 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 2548 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 2548 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2548 wrote to memory of 3620 2548 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 76 PID 2548 wrote to memory of 3620 2548 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 76 PID 2548 wrote to memory of 3620 2548 98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe"C:\Users\Admin\AppData\Local\Temp\98eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\Lcicya.exeC:\Windows\Lcicya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:3620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 6843⤵
- Program crash
PID:5108
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 9882⤵
- Program crash
PID:2832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3620 -ip 36201⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2548 -ip 25481⤵PID:4768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD51722ed342398e20d9b4c02290ed28ace
SHA1b821e79711d1b3cc1d3b1584eacfed472d3d6853
SHA25698eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7
SHA5128562ddd99405ba9edbef894470329690cc79de2d04e777611645bd3c0e96f840f8c2ba5722c58ef453a0f6e1f0df353f4b786039ba3b18612f74cf411c765489
-
Filesize
205KB
MD51722ed342398e20d9b4c02290ed28ace
SHA1b821e79711d1b3cc1d3b1584eacfed472d3d6853
SHA25698eaeab48ba9ffd2700ab985d7b874cacd8360b6865e25062f33d016224268d7
SHA5128562ddd99405ba9edbef894470329690cc79de2d04e777611645bd3c0e96f840f8c2ba5722c58ef453a0f6e1f0df353f4b786039ba3b18612f74cf411c765489
-
Filesize
426B
MD54e49ab669cc5f6ce6107848b0f5abfe1
SHA139062f6a91c6ce1ce7729e34dc9fa944c5851438
SHA2563c8516def833a34695f3a4c1a028fd5ff8c20da52fcbc63256717eab37d85e67
SHA5124f7bb5c2a714d28f17b2fd53337984c67419e862635689a8dfab0dcbb199e900302d552dec83ea3b8d08bd4f9900d0dcb617ea22a1d52b0a20de80cd7ce528c1