Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 03:20
Static task
static1
Behavioral task
behavioral1
Sample
5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe
Resource
win10v2004-20220812-en
General
-
Target
5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe
-
Size
187KB
-
MD5
e171aec3cf318e43d3724c38006b4547
-
SHA1
664013e1e14fcc98fff85cc30557decf5fdcb353
-
SHA256
5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e
-
SHA512
dc96c7a4b8402d36f5a44bf387f6639f07814afed120ffd944c9c169d934c0abb458b7893e5e6dbb6d2562f72949cd286868c869518bb07150c4d4b82daa0ac1
-
SSDEEP
3072:r2FUbtpT8ST1rybZJ93DrvF3EvCLlLeDj4/2+kjdW5895lHgPSxtEOTZ:rxV8Sprybb9T53Dc4G5H95lHgPSxt7TZ
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\POWERPNT.lnk 5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exedescription pid process target process PID 5040 set thread context of 5056 5040 5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe notepad.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3128 5056 WerFault.exe notepad.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exepid process 5040 5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe 5040 5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe 5040 5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe 5040 5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe 5040 5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe 5040 5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe 5040 5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe 5040 5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exepid process 5040 5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exedescription pid process target process PID 5040 wrote to memory of 5056 5040 5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe notepad.exe PID 5040 wrote to memory of 5056 5040 5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe notepad.exe PID 5040 wrote to memory of 5056 5040 5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe notepad.exe PID 5040 wrote to memory of 5056 5040 5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe"C:\Users\Admin\AppData\Local\Temp\5c25844d649ccdb04b64d2d17e27088cfdc1d60b08c80b3d88cded1f30b86e6e.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5056 -ip 50561⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5040-132-0x0000000000640000-0x00000000006BB000-memory.dmpFilesize
492KB
-
memory/5040-133-0x0000000000640000-0x00000000006BB000-memory.dmpFilesize
492KB
-
memory/5040-135-0x0000000000640000-0x00000000006BB000-memory.dmpFilesize
492KB
-
memory/5040-136-0x0000000002DA0000-0x0000000002E1B000-memory.dmpFilesize
492KB
-
memory/5056-134-0x0000000000000000-mapping.dmp