Analysis
-
max time kernel
150s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:52
Behavioral task
behavioral1
Sample
030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe
Resource
win7-20220901-en
General
-
Target
030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe
-
Size
852KB
-
MD5
4533680b5f18b53fbabefd1268e7aea0
-
SHA1
8e658bae62441e275a1b282eccbf4faa0e3c9586
-
SHA256
030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d
-
SHA512
1def674f675bc5d140a3b4c9b21782293601bee1d6ed0798587b5c1fbc0e8aad4fa1bea0ef3625acbe73edbe19cda0117cdb2a9ea4786b3935b7e8d9035cfcd5
-
SSDEEP
24576:9yiqCB6bLxIvoBWBhQUepoIqghkw4MWyBhSuClXjbkQ:9yiqCU3xz+5epoAqcWAozlXjIQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8dmgr.exepid process 4248 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8dmgr.exe -
Processes:
resource yara_rule behavioral2/memory/3528-132-0x0000000000400000-0x000000000070D000-memory.dmp upx behavioral2/memory/4248-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3528-140-0x0000000000400000-0x000000000070D000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8dmgr.exepid process 4248 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8dmgr.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exedescription ioc process File opened (read-only) \??\P: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\V: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\E: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\H: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\M: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\R: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\S: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\T: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\B: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\F: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\G: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\I: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\J: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\L: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\N: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\Q: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\A: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\W: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\Y: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\Z: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\U: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\O: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\X: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe File opened (read-only) \??\K: 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 456 4248 WerFault.exe 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8dmgr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exedescription pid process target process PID 3528 wrote to memory of 4248 3528 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8dmgr.exe PID 3528 wrote to memory of 4248 3528 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8dmgr.exe PID 3528 wrote to memory of 4248 3528 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe 030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8dmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe"C:\Users\Admin\AppData\Local\Temp\030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8d.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8dmgr.exeC:\Users\Admin\AppData\Local\Temp\030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8dmgr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 101763⤵
- Program crash
PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4248 -ip 42481⤵PID:3276
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8dmgr.exe
Filesize94KB
MD51375ba09995afa93cbfa59cae04b3ab4
SHA10eb0934173dbf2bd10b0c2bce9fb2d414305bb19
SHA2561a3c3ec1d2ee6bbaf9ab89b1247e9da435c729f6b539563d97eae84c8163918a
SHA512ebea2ee04de3c5b6633891df4d734a6a6422c154bbbb43d00ce2964a6ba76b0fd58bb30b9849c3a2f1578259c5c33d39bcc013a5c9fb8e56fa13107eccd4020f
-
C:\Users\Admin\AppData\Local\Temp\030ea997d9fef59cc2b2effd4f9dc7989bbb02ab3c44631f2b6048df9e5d8a8dmgr.exe
Filesize94KB
MD51375ba09995afa93cbfa59cae04b3ab4
SHA10eb0934173dbf2bd10b0c2bce9fb2d414305bb19
SHA2561a3c3ec1d2ee6bbaf9ab89b1247e9da435c729f6b539563d97eae84c8163918a
SHA512ebea2ee04de3c5b6633891df4d734a6a6422c154bbbb43d00ce2964a6ba76b0fd58bb30b9849c3a2f1578259c5c33d39bcc013a5c9fb8e56fa13107eccd4020f
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219