Analysis
-
max time kernel
29s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:22
Static task
static1
Behavioral task
behavioral1
Sample
b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe
Resource
win10v2004-20220901-en
General
-
Target
b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe
-
Size
513KB
-
MD5
53588683a2b9d0fd43239648d6680cc0
-
SHA1
fd712c7a7d2a3c994af32bf8bd6ca67722366bd5
-
SHA256
b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d
-
SHA512
d1c18c21db078d8067307f5de91e08c9c9fa62b2ea311e65474343e16233fbefe35d044025cbce63b10c07fd0da1988019b183e338bc75fe55379f9761a49964
-
SSDEEP
6144:bQeNai17Y56rKnBfWhveajzxwIEUYPaOYXS0RBzz7sLPlEmCfYqz:bQeN/7YkrWBfWhvRhQU80ScBILd+YG
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\P: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\S: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\V: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\W: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\G: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\L: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\M: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\R: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\J: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\K: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\N: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\T: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\U: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\X: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\E: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\H: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\I: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\O: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\Q: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\Y: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe File opened (read-only) \??\Z: b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\iexplore.exe b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 320 2040 WerFault.exe 27 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2040 b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 320 2040 b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe 29 PID 2040 wrote to memory of 320 2040 b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe 29 PID 2040 wrote to memory of 320 2040 b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe 29 PID 2040 wrote to memory of 320 2040 b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe"C:\Users\Admin\AppData\Local\Temp\b14be0ef0ab6ede73de098f5d6d5f7bbc31a03c5109180b720517767ee88ad0d.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 4242⤵
- Program crash
PID:320
-