Analysis

  • max time kernel
    111s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:47

General

  • Target

    book-298371.exe

  • Size

    116KB

  • MD5

    aba53a493de62f3bbd17f14d73fcc461

  • SHA1

    fc6f4ce93a8e18da6e58d0c8ce1c7186f4bdf352

  • SHA256

    923bc504187aa43c28a00615b86b36255b2730142f7392f54849f91885876e6c

  • SHA512

    bd80dba344ab807b8b40f5dfaa50856db5f9a6f4fb0c8794995e92198f25f1e76eee24dead645b7f1afe2f2258dbe0f5e2f5620586ad887f912be0d53d9e078c

  • SSDEEP

    3072:IthOHk1wxL2Ms37bJISjhFdtxthzNV50Vo:Xk1wZ2MQuChFdf90

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2640
      • C:\Users\Admin\AppData\Local\Temp\book-298371.exe
        "C:\Users\Admin\AppData\Local\Temp\book-298371.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5060
        • C:\Users\Admin\Documents\CommonData\Winhlp31.exe
          C:\Users\Admin\Documents\CommonData\Winhlp31.exe C:\Users\Admin\AppData\Local\Temp\book-298371.exe
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2552
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 1360
            4⤵
            • Program crash
            PID:1828
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2552 -ip 2552
      1⤵
        PID:3840

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Documents\CommonData\Winhlp31.exe

        Filesize

        116KB

        MD5

        aba53a493de62f3bbd17f14d73fcc461

        SHA1

        fc6f4ce93a8e18da6e58d0c8ce1c7186f4bdf352

        SHA256

        923bc504187aa43c28a00615b86b36255b2730142f7392f54849f91885876e6c

        SHA512

        bd80dba344ab807b8b40f5dfaa50856db5f9a6f4fb0c8794995e92198f25f1e76eee24dead645b7f1afe2f2258dbe0f5e2f5620586ad887f912be0d53d9e078c

      • C:\Users\Admin\Documents\CommonData\Winhlp31.exe

        Filesize

        116KB

        MD5

        aba53a493de62f3bbd17f14d73fcc461

        SHA1

        fc6f4ce93a8e18da6e58d0c8ce1c7186f4bdf352

        SHA256

        923bc504187aa43c28a00615b86b36255b2730142f7392f54849f91885876e6c

        SHA512

        bd80dba344ab807b8b40f5dfaa50856db5f9a6f4fb0c8794995e92198f25f1e76eee24dead645b7f1afe2f2258dbe0f5e2f5620586ad887f912be0d53d9e078c

      • memory/2552-135-0x0000000000000000-mapping.dmp

      • memory/2552-139-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2552-140-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2552-141-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2552-142-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/5060-132-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/5060-133-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/5060-134-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/5060-138-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB