Analysis

  • max time kernel
    166s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 11:01

General

  • Target

    9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe

  • Size

    104KB

  • MD5

    15e562adff087d9a1d6728db1a7dfe2c

  • SHA1

    26381b934871de765a56040492c39a27a20662c0

  • SHA256

    9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097

  • SHA512

    1e05f735bc7ad15087bd577b272ebd5619f21adf429266c8ec4327265ef295537ae86b247c7a318273b2b8378e8016cf0171ff96280c4c9a018e031961af2352

  • SSDEEP

    1536:nyUTWif8HmhBt9w2L18uSISpTJLD6u0zxnuRDCEXBdKW9C/fLFRgcfd:yUjf19w2LiuzSLizxWD3PKW9CLFy

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe
    "C:\Users\Admin\AppData\Local\Temp\9daebdaf14df08bd21d59cf86c618cd8b7cad4d787459b7a4a499626a3b41097.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe
      2⤵
        PID:1948
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 12
          3⤵
          • Program crash
          PID:4944
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1948 -ip 1948
      1⤵
        PID:4780

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1948-135-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/1948-136-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2240-138-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB