Analysis
-
max time kernel
93s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
c9fe980315b4a6173172f63828e9d1f087e5fcdab309ea10f326505a3081ea64.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c9fe980315b4a6173172f63828e9d1f087e5fcdab309ea10f326505a3081ea64.exe
Resource
win10v2004-20220812-en
General
-
Target
c9fe980315b4a6173172f63828e9d1f087e5fcdab309ea10f326505a3081ea64.exe
-
Size
199KB
-
MD5
9fdb5c00a6f5c82c474754b78ce83884
-
SHA1
2ae7697ba6d3d99fd308314ebe31d5fbefa696ad
-
SHA256
c9fe980315b4a6173172f63828e9d1f087e5fcdab309ea10f326505a3081ea64
-
SHA512
d7efd6cecd97196830b7678fd852fa640fc81ef4d5e6c1d8f3a8b25db60f9ea722009a0d4ca9550c67288599ee73e4aaa7ebdffadcafc302bd003ab007ee257b
-
SSDEEP
3072:9Lv1uEf8uBwhGhDdXsrhmnc2l2EchnYeybWWeheZf3Hi+sCSTGl:19uEEThWXsrhTddnYeDbyw1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4964 c9fe980315b4a6173172f63828e9d1f087e5fcdab309ea10f326505a3081ea64Srv.exe -
resource yara_rule behavioral2/files/0x000e000000022f50-134.dat upx behavioral2/files/0x000e000000022f50-135.dat upx behavioral2/memory/4964-137-0x0000000000400000-0x0000000000441000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4692 4964 WerFault.exe 80 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5080 wrote to memory of 4964 5080 c9fe980315b4a6173172f63828e9d1f087e5fcdab309ea10f326505a3081ea64.exe 80 PID 5080 wrote to memory of 4964 5080 c9fe980315b4a6173172f63828e9d1f087e5fcdab309ea10f326505a3081ea64.exe 80 PID 5080 wrote to memory of 4964 5080 c9fe980315b4a6173172f63828e9d1f087e5fcdab309ea10f326505a3081ea64.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9fe980315b4a6173172f63828e9d1f087e5fcdab309ea10f326505a3081ea64.exe"C:\Users\Admin\AppData\Local\Temp\c9fe980315b4a6173172f63828e9d1f087e5fcdab309ea10f326505a3081ea64.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\c9fe980315b4a6173172f63828e9d1f087e5fcdab309ea10f326505a3081ea64Srv.exeC:\Users\Admin\AppData\Local\Temp\c9fe980315b4a6173172f63828e9d1f087e5fcdab309ea10f326505a3081ea64Srv.exe2⤵
- Executes dropped EXE
PID:4964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 2683⤵
- Program crash
PID:4692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4964 -ip 49641⤵PID:5044
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\c9fe980315b4a6173172f63828e9d1f087e5fcdab309ea10f326505a3081ea64Srv.exe
Filesize94KB
MD5f6736faa3126f64ed4a7109e40c47806
SHA10d50917f44d6e173bac24916c95343616dcbf18c
SHA256bc0cb854888c155cbfed860a6546bea3c82db643df30437fe14d91194939a874
SHA51229cc26cd4df360252917a5d913e5e4776b6d05061b464f09dbb33918491affdc15cac9e142a9227a48f27d26db1f8ee85bd3d417365d6fef9b2fd380e090efe5
-
C:\Users\Admin\AppData\Local\Temp\c9fe980315b4a6173172f63828e9d1f087e5fcdab309ea10f326505a3081ea64Srv.exe
Filesize94KB
MD5f6736faa3126f64ed4a7109e40c47806
SHA10d50917f44d6e173bac24916c95343616dcbf18c
SHA256bc0cb854888c155cbfed860a6546bea3c82db643df30437fe14d91194939a874
SHA51229cc26cd4df360252917a5d913e5e4776b6d05061b464f09dbb33918491affdc15cac9e142a9227a48f27d26db1f8ee85bd3d417365d6fef9b2fd380e090efe5