Analysis
-
max time kernel
166s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 11:01
Static task
static1
Behavioral task
behavioral1
Sample
9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe
Resource
win10v2004-20220812-en
General
-
Target
9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe
-
Size
104KB
-
MD5
15e562adff087d9a1d6728db1a7dfe2c
-
SHA1
26381b934871de765a56040492c39a27a20662c0
-
SHA256
9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097
-
SHA512
1e05f735bc7ad15087bd577b272ebd5619f21adf429266c8ec4327265ef295537ae86b247c7a318273b2b8378e8016cf0171ff96280c4c9a018e031961af2352
-
SSDEEP
1536:nyUTWif8HmhBt9w2L18uSISpTJLD6u0zxnuRDCEXBdKW9C/fLFRgcfd:yUjf19w2LiuzSLizxWD3PKW9CLFy
Malware Config
Signatures
-
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\amurpm.dll 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe File opened for modification C:\Windows\SysWOW64\userinit.exe 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe File opened for modification C:\Windows\SysWOW64\ntxeed.dll 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2240 set thread context of 1948 2240 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 80 -
Program crash 1 IoCs
pid pid_target Process procid_target 4944 1948 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2240 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 2240 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 2240 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 2240 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 2240 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 2240 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2240 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1948 2240 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 80 PID 2240 wrote to memory of 1948 2240 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 80 PID 2240 wrote to memory of 1948 2240 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 80 PID 2240 wrote to memory of 1948 2240 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 80 PID 2240 wrote to memory of 1948 2240 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 80 PID 2240 wrote to memory of 1948 2240 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 80 PID 2240 wrote to memory of 1948 2240 9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe"C:\Users\Admin\AppData\Local\Temp\9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe2⤵PID:1948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 123⤵
- Program crash
PID:4944
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1948 -ip 19481⤵PID:4780