Analysis
-
max time kernel
142s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:52
Static task
static1
Behavioral task
behavioral1
Sample
d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe
Resource
win10v2004-20221111-en
General
-
Target
d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe
-
Size
1016KB
-
MD5
252aec6a18c5150de4638f64a9541dcf
-
SHA1
e854d367d99a9fd1d30cd0a3f6909a4b00dd12a2
-
SHA256
d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93
-
SHA512
b5d5336776b3975e2eec78a6b33ae74ab54bec6b2f4be4afe7362349bc83a2e1373e6b51de645732a11a3504b776fbc8ba83acd38cf503425d3cec0ba0ac25fb
-
SSDEEP
24576:ey6L8O4gs6PfbxGH6VMS/bB89vfIABqM:ey6L8O4gs6PTu62S/+vAAUM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Sdmr.exepid process 4740 Sdmr.exe -
Drops file in Windows directory 2 IoCs
Processes:
d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exedescription ioc process File created C:\Windows\Sdmr.exe d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe File created C:\Windows\dmr.exe d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4728 4740 WerFault.exe Sdmr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exepid process 1080 d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe 1080 d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exedescription pid process target process PID 1080 wrote to memory of 4740 1080 d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe Sdmr.exe PID 1080 wrote to memory of 4740 1080 d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe Sdmr.exe PID 1080 wrote to memory of 4740 1080 d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe Sdmr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe"C:\Users\Admin\AppData\Local\Temp\d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\Sdmr.exeC:\Windows\Sdmr setup2⤵
- Executes dropped EXE
PID:4740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 2683⤵
- Program crash
PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4740 -ip 47401⤵PID:1312
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD50216b1a5d4119db22d7db2f83cb749c0
SHA196b59bdba78e6f6596380bdb50a8e60121829b59
SHA256b9e10ce8978ab2aff57f30b3101d463f1dc2101e7098f19f2300f228d8d9047e
SHA51298c64cf687c1e0e2b1d5fe04570186cb293012a8de2069c585e91dc5f119efdf71deff16d8f4cf9caff7e0b8938a896d5e68d2e1f06fdedee4826099efae8ff9
-
Filesize
185KB
MD50216b1a5d4119db22d7db2f83cb749c0
SHA196b59bdba78e6f6596380bdb50a8e60121829b59
SHA256b9e10ce8978ab2aff57f30b3101d463f1dc2101e7098f19f2300f228d8d9047e
SHA51298c64cf687c1e0e2b1d5fe04570186cb293012a8de2069c585e91dc5f119efdf71deff16d8f4cf9caff7e0b8938a896d5e68d2e1f06fdedee4826099efae8ff9