Analysis
-
max time kernel
254s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:52
Static task
static1
Behavioral task
behavioral1
Sample
b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe
Resource
win10v2004-20221111-en
General
-
Target
b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe
-
Size
984KB
-
MD5
f25a8e3f5265a57269590b84a506b672
-
SHA1
8413ee5a55d52fd306320f5f1429a55a39bd7a47
-
SHA256
b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1
-
SHA512
89e1348e9f62bfa5f3af06b659396cd687511259a7b425720f31de50f0a90e9b9f546a80f56d018ffab8d8379bece5a5a04872f5793f3cbcf849d209959f2095
-
SSDEEP
24576:WiZ4NMlr/acS4uAvgMLAtsXBP70m+V751ac0u+1K6yusNHAAlAPnKV17UipvMySP:9MMlry34usg6AtsRz0r1X0TKHRlAP2dr
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Sdmr.exeSdmr.exedmr.exepid process 1700 Sdmr.exe 3812 Sdmr.exe 3140 dmr.exe -
Drops file in Windows directory 2 IoCs
Processes:
b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exedescription ioc process File created C:\Windows\Sdmr.exe b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe File created C:\Windows\dmr.exe b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1004 3140 WerFault.exe dmr.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Sdmr.exepid process 3812 Sdmr.exe 3812 Sdmr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exepid process 4920 b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe 4920 b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exeSdmr.exedescription pid process target process PID 4920 wrote to memory of 1700 4920 b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe Sdmr.exe PID 4920 wrote to memory of 1700 4920 b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe Sdmr.exe PID 4920 wrote to memory of 1700 4920 b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe Sdmr.exe PID 3812 wrote to memory of 3140 3812 Sdmr.exe dmr.exe PID 3812 wrote to memory of 3140 3812 Sdmr.exe dmr.exe PID 3812 wrote to memory of 3140 3812 Sdmr.exe dmr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe"C:\Users\Admin\AppData\Local\Temp\b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\Sdmr.exeC:\Windows\Sdmr setup2⤵
- Executes dropped EXE
PID:1700
-
C:\Windows\Sdmr.exeC:\Windows\Sdmr.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\dmr.exeC:\Windows\dmr.exe2⤵
- Executes dropped EXE
PID:3140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 5683⤵
- Program crash
PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3140 -ip 31401⤵PID:4152
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD52bc9ace5bddaa9f70ed0e8fb22489732
SHA1a5de5307a484f0d4deae2c49ac007ce5c49a5fc4
SHA2566a98757092493227b0ba5250b51c33e7cd075e745eaf9dba8e42f67ca484af04
SHA5123005bff9a0c5f6a871e7a4824a98f9f534bbf19a4c30e719a55640cd7e96141babd0b85c7b3bfa6e3e4afdfa7bb98354dcdc158a6d95f1e4c3b518e356ec7a0a
-
Filesize
174KB
MD52bc9ace5bddaa9f70ed0e8fb22489732
SHA1a5de5307a484f0d4deae2c49ac007ce5c49a5fc4
SHA2566a98757092493227b0ba5250b51c33e7cd075e745eaf9dba8e42f67ca484af04
SHA5123005bff9a0c5f6a871e7a4824a98f9f534bbf19a4c30e719a55640cd7e96141babd0b85c7b3bfa6e3e4afdfa7bb98354dcdc158a6d95f1e4c3b518e356ec7a0a
-
Filesize
174KB
MD52bc9ace5bddaa9f70ed0e8fb22489732
SHA1a5de5307a484f0d4deae2c49ac007ce5c49a5fc4
SHA2566a98757092493227b0ba5250b51c33e7cd075e745eaf9dba8e42f67ca484af04
SHA5123005bff9a0c5f6a871e7a4824a98f9f534bbf19a4c30e719a55640cd7e96141babd0b85c7b3bfa6e3e4afdfa7bb98354dcdc158a6d95f1e4c3b518e356ec7a0a
-
Filesize
615KB
MD5740684adb016a0a91bcff5b85025eacd
SHA18af85714dab623dee63b08a68b04ff444a0ad7e4
SHA25624f690fe8107966b32c2b2b7c9f8b3e778976524c9baf9e25a0cb539a17a1bae
SHA512dabf86d53b7906fed43cd3f0f16f2878fe97e44b7b40feb86571adef712d532de6c356f492d734c2f0aa2381935f531c833cd6148c5a384676b11b66ce8b352e
-
Filesize
615KB
MD5740684adb016a0a91bcff5b85025eacd
SHA18af85714dab623dee63b08a68b04ff444a0ad7e4
SHA25624f690fe8107966b32c2b2b7c9f8b3e778976524c9baf9e25a0cb539a17a1bae
SHA512dabf86d53b7906fed43cd3f0f16f2878fe97e44b7b40feb86571adef712d532de6c356f492d734c2f0aa2381935f531c833cd6148c5a384676b11b66ce8b352e