Analysis
-
max time kernel
75s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 23:28
Behavioral task
behavioral1
Sample
5d13e309918b9481d5d6b31a99a6575ccdf18331d3a620505d5ce9f2abe4d0ed.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d13e309918b9481d5d6b31a99a6575ccdf18331d3a620505d5ce9f2abe4d0ed.exe
Resource
win10v2004-20221111-en
General
-
Target
5d13e309918b9481d5d6b31a99a6575ccdf18331d3a620505d5ce9f2abe4d0ed.exe
-
Size
1.1MB
-
MD5
067f80fff1e3815c9a112082c5dca314
-
SHA1
6fa185970bcecdb0fecd07a5281fb5856b8b5485
-
SHA256
5d13e309918b9481d5d6b31a99a6575ccdf18331d3a620505d5ce9f2abe4d0ed
-
SHA512
7cb3766448bb04c338c6bb74a06528406cf77717765a15c58da4de1ebb01a95504de29506b1b3fb81dfecd97c6ff40f08d2061c27bfc1ea55f79f2994f722093
-
SSDEEP
24576:W9kY7vgEeJPq34ZTdQXtnqhz2cOmsRQsmjmPOIzAFMn0k7:W9kYuZTdAtS2lpSovcFI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 540 6c645f.exe -
resource yara_rule behavioral1/memory/1416-55-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/files/0x000a0000000122e0-56.dat upx behavioral1/files/0x000a0000000122e0-57.dat upx behavioral1/files/0x000a0000000122e0-59.dat upx behavioral1/memory/540-63-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/memory/1416-64-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/memory/540-65-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/files/0x000a0000000122e0-68.dat upx behavioral1/files/0x000a0000000122e0-72.dat upx behavioral1/files/0x000a0000000122e0-71.dat upx behavioral1/files/0x000a0000000122e0-70.dat upx behavioral1/files/0x000a0000000122e0-69.dat upx behavioral1/files/0x000a0000000122e0-67.dat upx behavioral1/files/0x000a0000000122e0-73.dat upx -
Loads dropped DLL 9 IoCs
pid Process 1416 5d13e309918b9481d5d6b31a99a6575ccdf18331d3a620505d5ce9f2abe4d0ed.exe 1416 5d13e309918b9481d5d6b31a99a6575ccdf18331d3a620505d5ce9f2abe4d0ed.exe 820 WerFault.exe 820 WerFault.exe 820 WerFault.exe 820 WerFault.exe 820 WerFault.exe 820 WerFault.exe 820 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 820 540 WerFault.exe 26 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 6c645f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde 6c645f.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1416 5d13e309918b9481d5d6b31a99a6575ccdf18331d3a620505d5ce9f2abe4d0ed.exe 1416 5d13e309918b9481d5d6b31a99a6575ccdf18331d3a620505d5ce9f2abe4d0ed.exe 540 6c645f.exe 540 6c645f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1416 wrote to memory of 540 1416 5d13e309918b9481d5d6b31a99a6575ccdf18331d3a620505d5ce9f2abe4d0ed.exe 26 PID 1416 wrote to memory of 540 1416 5d13e309918b9481d5d6b31a99a6575ccdf18331d3a620505d5ce9f2abe4d0ed.exe 26 PID 1416 wrote to memory of 540 1416 5d13e309918b9481d5d6b31a99a6575ccdf18331d3a620505d5ce9f2abe4d0ed.exe 26 PID 1416 wrote to memory of 540 1416 5d13e309918b9481d5d6b31a99a6575ccdf18331d3a620505d5ce9f2abe4d0ed.exe 26 PID 540 wrote to memory of 820 540 6c645f.exe 29 PID 540 wrote to memory of 820 540 6c645f.exe 29 PID 540 wrote to memory of 820 540 6c645f.exe 29 PID 540 wrote to memory of 820 540 6c645f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d13e309918b9481d5d6b31a99a6575ccdf18331d3a620505d5ce9f2abe4d0ed.exe"C:\Users\Admin\AppData\Local\Temp\5d13e309918b9481d5d6b31a99a6575ccdf18331d3a620505d5ce9f2abe4d0ed.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\6c645f.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\6c645f.exe 71035832⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 14563⤵
- Loads dropped DLL
- Program crash
PID:820
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50317c9c4304f465cc97b16ea590e2dd3
SHA16eadc13bc5b1d2fef7d34f0a5dd34b42c97bb3ee
SHA256821c47fc8b7e0d2b534dabb2ccc26b7102e80878f9f4aff7551e72e9728934b7
SHA512e3277047672dc094a36be3a1f03470d49d8b6f194679ce0430f25472de00cd9026876ca6b86f0a054466948b2e8c4a6b10092df37bb5b89900aaba44670157e0
-
Filesize
1.1MB
MD50317c9c4304f465cc97b16ea590e2dd3
SHA16eadc13bc5b1d2fef7d34f0a5dd34b42c97bb3ee
SHA256821c47fc8b7e0d2b534dabb2ccc26b7102e80878f9f4aff7551e72e9728934b7
SHA512e3277047672dc094a36be3a1f03470d49d8b6f194679ce0430f25472de00cd9026876ca6b86f0a054466948b2e8c4a6b10092df37bb5b89900aaba44670157e0
-
Filesize
1.1MB
MD50317c9c4304f465cc97b16ea590e2dd3
SHA16eadc13bc5b1d2fef7d34f0a5dd34b42c97bb3ee
SHA256821c47fc8b7e0d2b534dabb2ccc26b7102e80878f9f4aff7551e72e9728934b7
SHA512e3277047672dc094a36be3a1f03470d49d8b6f194679ce0430f25472de00cd9026876ca6b86f0a054466948b2e8c4a6b10092df37bb5b89900aaba44670157e0
-
Filesize
1.1MB
MD50317c9c4304f465cc97b16ea590e2dd3
SHA16eadc13bc5b1d2fef7d34f0a5dd34b42c97bb3ee
SHA256821c47fc8b7e0d2b534dabb2ccc26b7102e80878f9f4aff7551e72e9728934b7
SHA512e3277047672dc094a36be3a1f03470d49d8b6f194679ce0430f25472de00cd9026876ca6b86f0a054466948b2e8c4a6b10092df37bb5b89900aaba44670157e0
-
Filesize
1.1MB
MD50317c9c4304f465cc97b16ea590e2dd3
SHA16eadc13bc5b1d2fef7d34f0a5dd34b42c97bb3ee
SHA256821c47fc8b7e0d2b534dabb2ccc26b7102e80878f9f4aff7551e72e9728934b7
SHA512e3277047672dc094a36be3a1f03470d49d8b6f194679ce0430f25472de00cd9026876ca6b86f0a054466948b2e8c4a6b10092df37bb5b89900aaba44670157e0
-
Filesize
1.1MB
MD50317c9c4304f465cc97b16ea590e2dd3
SHA16eadc13bc5b1d2fef7d34f0a5dd34b42c97bb3ee
SHA256821c47fc8b7e0d2b534dabb2ccc26b7102e80878f9f4aff7551e72e9728934b7
SHA512e3277047672dc094a36be3a1f03470d49d8b6f194679ce0430f25472de00cd9026876ca6b86f0a054466948b2e8c4a6b10092df37bb5b89900aaba44670157e0
-
Filesize
1.1MB
MD50317c9c4304f465cc97b16ea590e2dd3
SHA16eadc13bc5b1d2fef7d34f0a5dd34b42c97bb3ee
SHA256821c47fc8b7e0d2b534dabb2ccc26b7102e80878f9f4aff7551e72e9728934b7
SHA512e3277047672dc094a36be3a1f03470d49d8b6f194679ce0430f25472de00cd9026876ca6b86f0a054466948b2e8c4a6b10092df37bb5b89900aaba44670157e0
-
Filesize
1.1MB
MD50317c9c4304f465cc97b16ea590e2dd3
SHA16eadc13bc5b1d2fef7d34f0a5dd34b42c97bb3ee
SHA256821c47fc8b7e0d2b534dabb2ccc26b7102e80878f9f4aff7551e72e9728934b7
SHA512e3277047672dc094a36be3a1f03470d49d8b6f194679ce0430f25472de00cd9026876ca6b86f0a054466948b2e8c4a6b10092df37bb5b89900aaba44670157e0
-
Filesize
1.1MB
MD50317c9c4304f465cc97b16ea590e2dd3
SHA16eadc13bc5b1d2fef7d34f0a5dd34b42c97bb3ee
SHA256821c47fc8b7e0d2b534dabb2ccc26b7102e80878f9f4aff7551e72e9728934b7
SHA512e3277047672dc094a36be3a1f03470d49d8b6f194679ce0430f25472de00cd9026876ca6b86f0a054466948b2e8c4a6b10092df37bb5b89900aaba44670157e0
-
Filesize
1.1MB
MD50317c9c4304f465cc97b16ea590e2dd3
SHA16eadc13bc5b1d2fef7d34f0a5dd34b42c97bb3ee
SHA256821c47fc8b7e0d2b534dabb2ccc26b7102e80878f9f4aff7551e72e9728934b7
SHA512e3277047672dc094a36be3a1f03470d49d8b6f194679ce0430f25472de00cd9026876ca6b86f0a054466948b2e8c4a6b10092df37bb5b89900aaba44670157e0