Analysis

  • max time kernel
    142s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:52

General

  • Target

    d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe

  • Size

    1016KB

  • MD5

    252aec6a18c5150de4638f64a9541dcf

  • SHA1

    e854d367d99a9fd1d30cd0a3f6909a4b00dd12a2

  • SHA256

    d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93

  • SHA512

    b5d5336776b3975e2eec78a6b33ae74ab54bec6b2f4be4afe7362349bc83a2e1373e6b51de645732a11a3504b776fbc8ba83acd38cf503425d3cec0ba0ac25fb

  • SSDEEP

    24576:ey6L8O4gs6PfbxGH6VMS/bB89vfIABqM:ey6L8O4gs6PTu62S/+vAAUM

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe
    "C:\Users\Admin\AppData\Local\Temp\d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\Sdmr.exe
      C:\Windows\Sdmr setup
      2⤵
      • Executes dropped EXE
      PID:4740
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 268
        3⤵
        • Program crash
        PID:4728
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4740 -ip 4740
    1⤵
      PID:1312

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Sdmr.exe

      Filesize

      185KB

      MD5

      0216b1a5d4119db22d7db2f83cb749c0

      SHA1

      96b59bdba78e6f6596380bdb50a8e60121829b59

      SHA256

      b9e10ce8978ab2aff57f30b3101d463f1dc2101e7098f19f2300f228d8d9047e

      SHA512

      98c64cf687c1e0e2b1d5fe04570186cb293012a8de2069c585e91dc5f119efdf71deff16d8f4cf9caff7e0b8938a896d5e68d2e1f06fdedee4826099efae8ff9

    • C:\Windows\Sdmr.exe

      Filesize

      185KB

      MD5

      0216b1a5d4119db22d7db2f83cb749c0

      SHA1

      96b59bdba78e6f6596380bdb50a8e60121829b59

      SHA256

      b9e10ce8978ab2aff57f30b3101d463f1dc2101e7098f19f2300f228d8d9047e

      SHA512

      98c64cf687c1e0e2b1d5fe04570186cb293012a8de2069c585e91dc5f119efdf71deff16d8f4cf9caff7e0b8938a896d5e68d2e1f06fdedee4826099efae8ff9

    • memory/1080-132-0x0000000000400000-0x000000000056C000-memory.dmp

      Filesize

      1.4MB

    • memory/1080-139-0x0000000000400000-0x000000000056C000-memory.dmp

      Filesize

      1.4MB

    • memory/4740-133-0x0000000000000000-mapping.dmp

    • memory/4740-136-0x00000000004A0000-0x00000000004CF000-memory.dmp

      Filesize

      188KB

    • memory/4740-138-0x00000000005A0000-0x000000000063C000-memory.dmp

      Filesize

      624KB

    • memory/4740-137-0x00000000004A0000-0x00000000004CF000-memory.dmp

      Filesize

      188KB