Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 00:36
Static task
static1
Behavioral task
behavioral1
Sample
73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe
Resource
win7-20220812-en
General
-
Target
73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe
-
Size
171KB
-
MD5
8f02ee241d09bd77a1ee343df760d46c
-
SHA1
52a44cae03f45fca531e6de7fc8c2f193572c74b
-
SHA256
73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc
-
SHA512
48422683c63df68525d37cd3b69461ca2894dae31fe0cdf40b0eec50b828e9ef695957da97ff1b7900fdd2d8f564d902965b0deecee305f60ea62d18609b47a2
-
SSDEEP
3072:PM1BjoYNXoKDIJBXJPFyj8uZLpHWUueS5oCEY5sMubWsqfW9X25rplo6sOvuP4hj:PMMYNXqBBFyj8iV2UHS2CEYHsdrmlopW
Malware Config
Signatures
-
Loads dropped DLL 10 IoCs
pid Process 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe 956 WerFault.exe 956 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 956 1512 WerFault.exe 26 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1512 wrote to memory of 956 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe 27 PID 1512 wrote to memory of 956 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe 27 PID 1512 wrote to memory of 956 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe 27 PID 1512 wrote to memory of 956 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe 27 PID 1512 wrote to memory of 956 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe 27 PID 1512 wrote to memory of 956 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe 27 PID 1512 wrote to memory of 956 1512 73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe"C:\Users\Admin\AppData\Local\Temp\73c46099141162fad84e843dd3025b4607887b4cbb96a544fa56e6f58a463acc.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 6802⤵
- Loads dropped DLL
- Program crash
PID:956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
163KB
MD52dc35ddcabcb2b24919b9afae4ec3091
SHA19eeed33c3abc656353a7ebd1c66af38cccadd939
SHA2566bbeb39747f1526752980d4dbec2fe2c7347f3cc983a79c92561b92fe472e7a1
SHA5120ccac336924f684da1f73db2dd230a0c932c5b4115ae1fa0e708b9db5e39d2a07dc54dac8d95881a42069cbb2c2886e880cdad715deda83c0de38757a0f6a901
-
Filesize
147KB
MD5cdc131ab9fec85a1c0a047b1aff76d9b
SHA1e912bcea481937865474ca47deeca4f888e357df
SHA2561caa9068a187e07d7ffaa1563523d5bf6123a9074ec61b00d23b297aac69c805
SHA51287948a5a5ca45a030e9781638fd4e65346dec2aee0efb2ae7b9ed5ae96d0a01a23f288ea6eca7ca204e2106b4493f39df1857f7cc90a4147b6e57ab22bdce6d4
-
Filesize
147KB
MD5cdc131ab9fec85a1c0a047b1aff76d9b
SHA1e912bcea481937865474ca47deeca4f888e357df
SHA2561caa9068a187e07d7ffaa1563523d5bf6123a9074ec61b00d23b297aac69c805
SHA51287948a5a5ca45a030e9781638fd4e65346dec2aee0efb2ae7b9ed5ae96d0a01a23f288ea6eca7ca204e2106b4493f39df1857f7cc90a4147b6e57ab22bdce6d4
-
Filesize
147KB
MD5cdc131ab9fec85a1c0a047b1aff76d9b
SHA1e912bcea481937865474ca47deeca4f888e357df
SHA2561caa9068a187e07d7ffaa1563523d5bf6123a9074ec61b00d23b297aac69c805
SHA51287948a5a5ca45a030e9781638fd4e65346dec2aee0efb2ae7b9ed5ae96d0a01a23f288ea6eca7ca204e2106b4493f39df1857f7cc90a4147b6e57ab22bdce6d4
-
Filesize
147KB
MD5cdc131ab9fec85a1c0a047b1aff76d9b
SHA1e912bcea481937865474ca47deeca4f888e357df
SHA2561caa9068a187e07d7ffaa1563523d5bf6123a9074ec61b00d23b297aac69c805
SHA51287948a5a5ca45a030e9781638fd4e65346dec2aee0efb2ae7b9ed5ae96d0a01a23f288ea6eca7ca204e2106b4493f39df1857f7cc90a4147b6e57ab22bdce6d4
-
Filesize
147KB
MD5cdc131ab9fec85a1c0a047b1aff76d9b
SHA1e912bcea481937865474ca47deeca4f888e357df
SHA2561caa9068a187e07d7ffaa1563523d5bf6123a9074ec61b00d23b297aac69c805
SHA51287948a5a5ca45a030e9781638fd4e65346dec2aee0efb2ae7b9ed5ae96d0a01a23f288ea6eca7ca204e2106b4493f39df1857f7cc90a4147b6e57ab22bdce6d4
-
Filesize
147KB
MD5cdc131ab9fec85a1c0a047b1aff76d9b
SHA1e912bcea481937865474ca47deeca4f888e357df
SHA2561caa9068a187e07d7ffaa1563523d5bf6123a9074ec61b00d23b297aac69c805
SHA51287948a5a5ca45a030e9781638fd4e65346dec2aee0efb2ae7b9ed5ae96d0a01a23f288ea6eca7ca204e2106b4493f39df1857f7cc90a4147b6e57ab22bdce6d4
-
Filesize
147KB
MD5cdc131ab9fec85a1c0a047b1aff76d9b
SHA1e912bcea481937865474ca47deeca4f888e357df
SHA2561caa9068a187e07d7ffaa1563523d5bf6123a9074ec61b00d23b297aac69c805
SHA51287948a5a5ca45a030e9781638fd4e65346dec2aee0efb2ae7b9ed5ae96d0a01a23f288ea6eca7ca204e2106b4493f39df1857f7cc90a4147b6e57ab22bdce6d4
-
Filesize
4KB
MD505450face243b3a7472407b999b03a72
SHA1ffd88af2e338ae606c444390f7eaaf5f4aef2cd9
SHA25695fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89
SHA512f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b