Analysis
-
max time kernel
151s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
f75a0978486ed19cdc9e05b6dadbdd6dac50b6560e0dd1e0e460c1089810aeb8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f75a0978486ed19cdc9e05b6dadbdd6dac50b6560e0dd1e0e460c1089810aeb8.exe
Resource
win10v2004-20220901-en
General
-
Target
f75a0978486ed19cdc9e05b6dadbdd6dac50b6560e0dd1e0e460c1089810aeb8.exe
-
Size
380KB
-
MD5
f9dcb2a3e1c22fd565e2ffe423cde3ab
-
SHA1
3370f4e28ee882d70f8f9418ef11126e95aa7a52
-
SHA256
f75a0978486ed19cdc9e05b6dadbdd6dac50b6560e0dd1e0e460c1089810aeb8
-
SHA512
881d5525a3e6d220ab177220236261c60a07197e034515a01f18e3f8fe0f4fad1dd8147e4811652a2543e86f31db61aa53a238171db0ba711877fd85b682fbc6
-
SSDEEP
6144:Mbm153RT5miL01XHBNU5xkQIzxqbMDOWaIIvBLysmWhZiqXt+9U9Ptg+sBxL6:Mb453BI1XHBNvQIkQDOBIIxX7hvXsU9c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5028 eE01819FcMbC01819.exe -
resource yara_rule behavioral2/memory/3368-135-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/5028-136-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eE01819FcMbC01819 = "C:\\ProgramData\\eE01819FcMbC01819\\eE01819FcMbC01819.exe" eE01819FcMbC01819.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4736 3368 WerFault.exe 40 3592 5028 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3368 f75a0978486ed19cdc9e05b6dadbdd6dac50b6560e0dd1e0e460c1089810aeb8.exe 3368 f75a0978486ed19cdc9e05b6dadbdd6dac50b6560e0dd1e0e460c1089810aeb8.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3368 f75a0978486ed19cdc9e05b6dadbdd6dac50b6560e0dd1e0e460c1089810aeb8.exe Token: SeDebugPrivilege 5028 eE01819FcMbC01819.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5028 eE01819FcMbC01819.exe 5028 eE01819FcMbC01819.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3368 wrote to memory of 5028 3368 f75a0978486ed19cdc9e05b6dadbdd6dac50b6560e0dd1e0e460c1089810aeb8.exe 81 PID 3368 wrote to memory of 5028 3368 f75a0978486ed19cdc9e05b6dadbdd6dac50b6560e0dd1e0e460c1089810aeb8.exe 81 PID 3368 wrote to memory of 5028 3368 f75a0978486ed19cdc9e05b6dadbdd6dac50b6560e0dd1e0e460c1089810aeb8.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\f75a0978486ed19cdc9e05b6dadbdd6dac50b6560e0dd1e0e460c1089810aeb8.exe"C:\Users\Admin\AppData\Local\Temp\f75a0978486ed19cdc9e05b6dadbdd6dac50b6560e0dd1e0e460c1089810aeb8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 12042⤵
- Program crash
PID:4736
-
-
C:\ProgramData\eE01819FcMbC01819\eE01819FcMbC01819.exe"C:\ProgramData\eE01819FcMbC01819\eE01819FcMbC01819.exe" "C:\Users\Admin\AppData\Local\Temp\f75a0978486ed19cdc9e05b6dadbdd6dac50b6560e0dd1e0e460c1089810aeb8.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 12163⤵
- Program crash
PID:3592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3368 -ip 33681⤵PID:932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5028 -ip 50281⤵PID:3916
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5f89bbcb28b16f9a9e58652350d988455
SHA146e7c91da9728cc72fcfc560a5620fb9f6d7737f
SHA2563404533e32390a69511f513960e08a50a2cc1fd6f0b965e55f2c2e6781452d69
SHA512f168fa65eac7754b8739447f7c069fc02b3da346bb4e25a098e872693bf1f88ebc8b1c5273ec18737876f0fd8a2178f62c4eb247c67f3c4cd092ce6241921f40
-
Filesize
380KB
MD5f89bbcb28b16f9a9e58652350d988455
SHA146e7c91da9728cc72fcfc560a5620fb9f6d7737f
SHA2563404533e32390a69511f513960e08a50a2cc1fd6f0b965e55f2c2e6781452d69
SHA512f168fa65eac7754b8739447f7c069fc02b3da346bb4e25a098e872693bf1f88ebc8b1c5273ec18737876f0fd8a2178f62c4eb247c67f3c4cd092ce6241921f40