Analysis
-
max time kernel
185s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 05:56
Behavioral task
behavioral1
Sample
89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe
Resource
win10v2004-20221111-en
General
-
Target
89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe
-
Size
128KB
-
MD5
8dd13c211f10d02fe4ae569f83f1f53e
-
SHA1
02502084bf6eecda8a5d6c111049f8ce6d30f15b
-
SHA256
89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e
-
SHA512
95f6ad709bd7a963b5527b40925c1aa92c7f0e738b9a9a4f9fed64c89121dd4efbf07c615494314ab1227a25de34daf86fd61ea8c489f407da13b1c366b00763
-
SSDEEP
3072:t9MFwWCekB/iJX/Xo6mNdVLUvUgk4xmxA83DI6:XrpuXSdVQsgk4gxA8l
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0007000000022e41-133.dat aspack_v212_v242 -
Loads dropped DLL 1 IoCs
pid Process 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\postsos = "C:\\Windows\\system32\\post.exe" 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\post.exe 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe File opened for modification C:\Windows\SysWOW64\post0.dll 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe File created C:\Windows\SysWOW64\post0.dll 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe File opened for modification C:\Windows\SysWOW64\post.exe 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1996 1400 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2744 1400 89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe"C:\Users\Admin\AppData\Local\Temp\89f90529ccbdb45d89149dec5f889676b390ff92c5797347f4df38c1fcf79a9e.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 4723⤵
- Program crash
PID:1996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1400 -ip 14001⤵PID:1116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5e76552523760e6ba3ceb98e77cba5c87
SHA1f65bd1daadff939be4ace16b629c472a591ebba0
SHA256cdf35f214ccb97ae6f3e98921fd89ff59158416d2c3a6b48ad17b2a5c492c5e8
SHA512cb0edc6875b821c16b73adb1fdd69fd340d883d68f38231a9a92837d7accf08476f655ea4c0dfef5525e80c9df069fdf68bce7276e8bae9433aa05cd751211d4