Analysis
-
max time kernel
111s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:47
Static task
static1
Behavioral task
behavioral1
Sample
book-298371.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
book-298371.exe
Resource
win10v2004-20220901-en
General
-
Target
book-298371.exe
-
Size
116KB
-
MD5
aba53a493de62f3bbd17f14d73fcc461
-
SHA1
fc6f4ce93a8e18da6e58d0c8ce1c7186f4bdf352
-
SHA256
923bc504187aa43c28a00615b86b36255b2730142f7392f54849f91885876e6c
-
SHA512
bd80dba344ab807b8b40f5dfaa50856db5f9a6f4fb0c8794995e92198f25f1e76eee24dead645b7f1afe2f2258dbe0f5e2f5620586ad887f912be0d53d9e078c
-
SSDEEP
3072:IthOHk1wxL2Ms37bJISjhFdtxthzNV50Vo:Xk1wZ2MQuChFdf90
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Winhlp31.exepid process 2552 Winhlp31.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Winhlp31.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winhlp31 = "C:\\Users\\Admin\\Documents\\CommonData\\Winhlp31.exe" Winhlp31.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1828 2552 WerFault.exe Winhlp31.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
book-298371.exeWinhlp31.exepid process 5060 book-298371.exe 5060 book-298371.exe 2552 Winhlp31.exe 2552 Winhlp31.exe 2552 Winhlp31.exe 2552 Winhlp31.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
book-298371.exeWinhlp31.exedescription pid process target process PID 5060 wrote to memory of 2552 5060 book-298371.exe Winhlp31.exe PID 5060 wrote to memory of 2552 5060 book-298371.exe Winhlp31.exe PID 5060 wrote to memory of 2552 5060 book-298371.exe Winhlp31.exe PID 2552 wrote to memory of 2640 2552 Winhlp31.exe Explorer.EXE PID 2552 wrote to memory of 2640 2552 Winhlp31.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\book-298371.exe"C:\Users\Admin\AppData\Local\Temp\book-298371.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\Documents\CommonData\Winhlp31.exeC:\Users\Admin\Documents\CommonData\Winhlp31.exe C:\Users\Admin\AppData\Local\Temp\book-298371.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 13604⤵
- Program crash
PID:1828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2552 -ip 25521⤵PID:3840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5aba53a493de62f3bbd17f14d73fcc461
SHA1fc6f4ce93a8e18da6e58d0c8ce1c7186f4bdf352
SHA256923bc504187aa43c28a00615b86b36255b2730142f7392f54849f91885876e6c
SHA512bd80dba344ab807b8b40f5dfaa50856db5f9a6f4fb0c8794995e92198f25f1e76eee24dead645b7f1afe2f2258dbe0f5e2f5620586ad887f912be0d53d9e078c
-
Filesize
116KB
MD5aba53a493de62f3bbd17f14d73fcc461
SHA1fc6f4ce93a8e18da6e58d0c8ce1c7186f4bdf352
SHA256923bc504187aa43c28a00615b86b36255b2730142f7392f54849f91885876e6c
SHA512bd80dba344ab807b8b40f5dfaa50856db5f9a6f4fb0c8794995e92198f25f1e76eee24dead645b7f1afe2f2258dbe0f5e2f5620586ad887f912be0d53d9e078c