Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 12:30
Static task
static1
Behavioral task
behavioral1
Sample
a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe
Resource
win10v2004-20220812-en
General
-
Target
a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe
-
Size
202KB
-
MD5
148270bf298fcb4033d6c42c91648176
-
SHA1
6cba9f11e63ecb3289e57cc5712a0147423d40b2
-
SHA256
a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146
-
SHA512
ac7aa90c6d0db79d8702c5ccfa2ad1d5e544108d140a528c70ade071f00a9f1e5367a6e9a4734f979ff259d35a4c7be17fa62516b7fd968385cdecec688ab715
-
SSDEEP
6144:ikG6TWCM3bi3P+KwqGFnoYvTK4XiMz9Hp7gfgT2uwI1k2:06/r/+GYbKc9J78gT2i1
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4740 a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4344 4740 WerFault.exe 79 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4740 a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe"C:\Users\Admin\AppData\Local\Temp\a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 6482⤵
- Program crash
PID:4344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4740 -ip 47401⤵PID:4840
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5a114bf8e11b0ecc1ef06c49b33c00411
SHA1b2ccf82ef889ba3667312dd7a6c8ffdff5659614
SHA256282cc574d16082d626296eac1ec88ba384a9a69ab8943db4ddd482c1a9291e49
SHA5129a1e00628cfb235b955293c0b5b77ef90d01143151d734f1532fa8e87db72dea1ccefbe0bcb372cb70eb0d4503415a3abe63760ba5fb7fa50c5ca23d9f3934f9