Analysis
-
max time kernel
36s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 22:08
Behavioral task
behavioral1
Sample
83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe
Resource
win10v2004-20221111-en
General
-
Target
83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe
-
Size
368KB
-
MD5
6447802add77f2f0228b5b6015cde870
-
SHA1
56a36a35ff13edec61d5865fd85f443d50faa1bc
-
SHA256
83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca
-
SHA512
b4c51b82c7518493b2265d6e631d29545a53a37ba66ca8c6b0b0fa4592044ac53c6fef91c309744d1a413736e378facfa805da0a14d14db07d1bb40a232454c3
-
SSDEEP
6144:GYXONapDj3gHOs8O6bP4gOKgQNd2nWEQ2zLBoxkL/+xfdJH8PF02FcJPk2m3MSm:JXMSjguROkwEg80nWEQka2DG1N8t02s8
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/784-55-0x0000000000270000-0x000000000030A000-memory.dmp upx -
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: 83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe File opened (read-only) \??\N: 83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe File opened (read-only) \??\B: 83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe File opened (read-only) \??\I: 83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe File opened (read-only) \??\W: 83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe File opened (read-only) \??\T: 83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe File opened (read-only) \??\Y: 83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe File opened (read-only) \??\K: 83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe File opened (read-only) \??\R: 83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe File opened (read-only) \??\G: 83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1428 784 WerFault.exe 25 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 784 wrote to memory of 1428 784 83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe 26 PID 784 wrote to memory of 1428 784 83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe 26 PID 784 wrote to memory of 1428 784 83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe 26 PID 784 wrote to memory of 1428 784 83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe"C:\Users\Admin\AppData\Local\Temp\83046b1c30eca49dee7071d0152fbd6e46ea0fdabce4d31f95d4a5b620201bca.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 784 -s 2882⤵
- Program crash
PID:1428
-