Analysis
-
max time kernel
102s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe
Resource
win7-20220901-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe
Resource
win10v2004-20220812-en
6 signatures
150 seconds
General
-
Target
dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe
-
Size
88KB
-
MD5
2c7196996f0b69b356bb5f30669dc9c8
-
SHA1
b10f59e21147707a7c8bf29c4688a7d4e20343c4
-
SHA256
dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b
-
SHA512
b830075140f1ca496b39ee24517c6fed71d41dd133f77983f84496f92bf2cc51011a2e643e4518b1463fea312f960bbbf62036ee41afed19c6018106224244ea
-
SSDEEP
1536:EcdG4FYebXF7lyWlKz8nCChjqm3OHgLDCtj7h:FdxbXez8ZhjAHgqt3h
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\amurpm.dll dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe File opened for modification C:\Windows\SysWOW64\userinit.exe dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe File opened for modification C:\Windows\SysWOW64\ntxeed.dll dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3096 set thread context of 3004 3096 dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe 80 -
Program crash 1 IoCs
pid pid_target Process procid_target 4376 3004 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3096 dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe 3096 dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe 3096 dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe 3096 dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe 3096 dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe 3096 dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3096 dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3096 wrote to memory of 3004 3096 dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe 80 PID 3096 wrote to memory of 3004 3096 dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe 80 PID 3096 wrote to memory of 3004 3096 dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe 80 PID 3096 wrote to memory of 3004 3096 dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe 80 PID 3096 wrote to memory of 3004 3096 dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe 80 PID 3096 wrote to memory of 3004 3096 dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe 80 PID 3096 wrote to memory of 3004 3096 dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe 80 PID 3096 wrote to memory of 3004 3096 dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe"C:\Users\Admin\AppData\Local\Temp\dfc06c52aaa077bf243bf70b7e2fa6fe75f10302f44e52a686d010f74b48de9b.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe2⤵PID:3004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 123⤵
- Program crash
PID:4376
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3004 -ip 30041⤵PID:1500