Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 16:02
Static task
static1
Behavioral task
behavioral1
Sample
f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe
Resource
win10v2004-20220812-en
General
-
Target
f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe
-
Size
332KB
-
MD5
5996ae5ce5b1ba79aab211992dba3d42
-
SHA1
4308c54a7d5ef62b379d7f171a29ab11875a9b95
-
SHA256
f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee
-
SHA512
c9101394f08fc71d273b74a1d99e5400bd1f1e8120f122c26f068668c059778e7c64efe43834b15f3e44ae644a570bc5369ecc937db55d5a674604541940479d
-
SSDEEP
6144:k17kgF25dWLF3zkPw3VM7+nJ6qLfyi87lw01793r5i78Adcvk05/Navio2maa1/h:sAgG4QyVq6J6+f8a01h3r59Ad4/Av/rj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exepid process 4820 f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exedescription pid process target process PID 1300 set thread context of 4820 1300 f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4780 4820 WerFault.exe f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exedescription pid process Token: SeDebugPrivilege 1300 f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.execsc.exedescription pid process target process PID 1300 wrote to memory of 4204 1300 f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe csc.exe PID 1300 wrote to memory of 4204 1300 f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe csc.exe PID 1300 wrote to memory of 4204 1300 f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe csc.exe PID 4204 wrote to memory of 8 4204 csc.exe cvtres.exe PID 4204 wrote to memory of 8 4204 csc.exe cvtres.exe PID 4204 wrote to memory of 8 4204 csc.exe cvtres.exe PID 1300 wrote to memory of 4820 1300 f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe PID 1300 wrote to memory of 4820 1300 f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe PID 1300 wrote to memory of 4820 1300 f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe PID 1300 wrote to memory of 4820 1300 f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe PID 1300 wrote to memory of 4820 1300 f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe PID 1300 wrote to memory of 4820 1300 f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe PID 1300 wrote to memory of 4820 1300 f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe PID 1300 wrote to memory of 4820 1300 f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe PID 1300 wrote to memory of 4820 1300 f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe PID 1300 wrote to memory of 4820 1300 f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe"C:\Users\Admin\AppData\Local\Temp\f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ndniufmk.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8727.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8726.tmp"3⤵
-
C:\Users\Admin\AppData\Roaming\f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exeC:\Users\Admin\AppData\Roaming\f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 123⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4820 -ip 48201⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES8727.tmpFilesize
1KB
MD567428642a7f2d5382b362f4bbaac55b3
SHA10c12ec8149ad271f074b219d17d37d3187177cd5
SHA2562898d160581b9376cb15e8b5af112bd0e52423dd02c9786c82614f0bf5418881
SHA512780258a424f9605164b87a25c2a8934ee5e3cd8f6f27ced820d4bb0dfda84a7f8b60ecd3badaf153bd959fa2cacebcc8b7818c4e2e21f3f6a5813147151b44b2
-
C:\Users\Admin\AppData\Local\Temp\ndniufmk.dllFilesize
5KB
MD553b5de8a78a34126ad86df887141a803
SHA1f14770cf51245f8be59f7a895edef036ab93b79f
SHA2565f33e940e5eab24549a895e059f7875c9c8d38b591dab3f92f5738c558f99909
SHA5125751c76b53299943378acf4dc42e7cfc58da59692c673f364e3dedc6718fe91cc423a66170265db262a8a31acef7749166171029bb05779c2d05817c2a5b7c6a
-
C:\Users\Admin\AppData\Roaming\f65aa0d9474becc2e522804b93cb2c5880777b2a5fddc7a9e566156935434aee.exeFilesize
6KB
MD5d89fdbb4172cee2b2f41033e62c677d6
SHA1c1917b579551f0915f1a0a8e8e3c7a6809284e6b
SHA2562cbdc0ddc7901a9b89615cc338f63e1800f864db431e7a7a85749f73cba0b383
SHA51248941f08ae00d342b52e3255b99ce36abb4e46a48075a760869bc86b1a32c0737eb2bd5e43d5ee665303ab134282f9732738755c4027043ed2d4f414faab63ed
-
\??\c:\Users\Admin\AppData\Local\Temp\CSC8726.tmpFilesize
652B
MD505886827e01c60a62febe4747541251c
SHA1b6987a70076a066484385408cd5c003358b4660c
SHA256320c2268ce97bcaf8ff6907bbffe18ed2d80ea84ab57a48eaab74c76ea4d3ab5
SHA512f65edc03ae8b79aa4fb958cd3e8f311a548c3a1737c9562c4ac7478902755e816ce6cc8ba032c07540eb4b90367f4c6bf3b01da36fb9ab5b93b739b4be08089f
-
\??\c:\Users\Admin\AppData\Local\Temp\ndniufmk.0.csFilesize
5KB
MD5cb25540570735d26bf391e8b54579396
SHA1135651d49409214d21348bb879f7973384a7a8cb
SHA256922ec415710a6e1465ed8553838ddf19c8deb32b75da6dfaca372c1067d2d743
SHA512553ce9d3647b196ccbd6612c06d301afac992130ec5c80fe8fa8a42bab4250053fad651227ff97d9fab4ba8aaff562d421236dc0b2b5d0d4a17430985dd07080
-
\??\c:\Users\Admin\AppData\Local\Temp\ndniufmk.cmdlineFilesize
206B
MD55f2f8514902d266d953e087297d41ee9
SHA1a03b5f9b6bd6a5f82a4d7109cf3760cc15689a03
SHA25696738ffab722f6f742eca21b40ad185b6532f8be3200774e9c79944331ac5b6f
SHA51284095237f51a2924ed86e6f9397199b6414f809e0718e06ea0e4c2e5b01d6a6f11c51d8a4195847a923d36d5ac72017a29cba93a3076cf30e235e0bf95d1752d
-
memory/8-136-0x0000000000000000-mapping.dmp
-
memory/1300-132-0x00000000745F0000-0x0000000074BA1000-memory.dmpFilesize
5.7MB
-
memory/1300-142-0x00000000745F0000-0x0000000074BA1000-memory.dmpFilesize
5.7MB
-
memory/4204-133-0x0000000000000000-mapping.dmp
-
memory/4820-140-0x0000000000000000-mapping.dmp