Analysis
-
max time kernel
105s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 13:42
Behavioral task
behavioral1
Sample
4fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5.exe
Resource
win10v2004-20220812-en
General
-
Target
4fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5.exe
-
Size
184KB
-
MD5
8a3f8bf967b89c12091795936aa264be
-
SHA1
b7a8b18689e2c38a6e16bcc73b8d44713c029651
-
SHA256
4fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5
-
SHA512
098b13568b05984344a98c7c177d666a6d47adb92d4b64f524946b4b7af6640a64d359295cf41988c07a58a988f1d28a1c30fc3ebc33b53e9119596810d64ebc
-
SSDEEP
3072:BANZfhEi27D+mgLbQe/n+SrSRoVJbqHVeGqLiF+aiSvjX0Y/5xZctAIXbTm:ebJE7D+JLbXmNqwHVeyFLvjXv/5fUAIW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Dcibaa.exepid process 1772 Dcibaa.exe -
Processes:
resource yara_rule behavioral2/memory/3372-132-0x0000000000400000-0x0000000000467000-memory.dmp upx C:\Windows\Dcibaa.exe upx C:\Windows\Dcibaa.exe upx -
Drops file in Windows directory 6 IoCs
Processes:
4fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5.exeDcibaa.exedescription ioc process File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5.exe File created C:\Windows\Dcibaa.exe 4fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5.exe File opened for modification C:\Windows\Dcibaa.exe 4fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Dcibaa.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Dcibaa.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 8 1772 WerFault.exe Dcibaa.exe -
Processes:
Dcibaa.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main Dcibaa.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
Processes:
Dcibaa.exepid process 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe 1772 Dcibaa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
4fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5.exedescription pid process target process PID 3372 wrote to memory of 1772 3372 4fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5.exe Dcibaa.exe PID 3372 wrote to memory of 1772 3372 4fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5.exe Dcibaa.exe PID 3372 wrote to memory of 1772 3372 4fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5.exe Dcibaa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5.exe"C:\Users\Admin\AppData\Local\Temp\4fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\Dcibaa.exeC:\Windows\Dcibaa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 8563⤵
- Program crash
PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1772 -ip 17721⤵PID:4832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD58a3f8bf967b89c12091795936aa264be
SHA1b7a8b18689e2c38a6e16bcc73b8d44713c029651
SHA2564fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5
SHA512098b13568b05984344a98c7c177d666a6d47adb92d4b64f524946b4b7af6640a64d359295cf41988c07a58a988f1d28a1c30fc3ebc33b53e9119596810d64ebc
-
Filesize
184KB
MD58a3f8bf967b89c12091795936aa264be
SHA1b7a8b18689e2c38a6e16bcc73b8d44713c029651
SHA2564fb3fcb2e22606728d0ff823bff8e21d59f636e5ba1dd7932d31dfe489cb89c5
SHA512098b13568b05984344a98c7c177d666a6d47adb92d4b64f524946b4b7af6640a64d359295cf41988c07a58a988f1d28a1c30fc3ebc33b53e9119596810d64ebc
-
Filesize
426B
MD55f58383efc504054f941bbaea6164d94
SHA1f13fc306198341f306d14bb69da22897c2a276f9
SHA256f7548b5866dd11e5e85a921bb9523f9146796a96ce79845f4e2be69b2bf84619
SHA512b6a7b62084d30b3daa505e3b06e1549481f12eae8a96d79d711e3b3f2ec8a306be4dc370bd271a256a202e3f57fb60ccbf53cf8d3da7060c3e04702e44241306