Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24-03-2023 17:54
Static task
static1
Behavioral task
behavioral1
Sample
FMod_Launcher (1).exe
Resource
win10-20230220-en
windows10-1703-x64
7 signatures
150 seconds
General
-
Target
FMod_Launcher (1).exe
-
Size
1.6MB
-
MD5
dbcd36d12a22f43052c7b1c4f795e533
-
SHA1
1ac35d781d8c8e495ec46249451558f758ce3d41
-
SHA256
11b3cfe00741aecc278e6ef0da367f4ac1ac1c7463c6d616f3f6b9e5339929a2
-
SHA512
67f52702c283246dfdceb3281aad9fc9d539b7883544cf825e9dcee738facdeba544b31fbe3cbd04cbc57a2a7a2662cd1b713979414b1aa4489b01dce2388314
-
SSDEEP
49152:SrgBWBKH8jkDVFCNXODzWS9HfX0Hj7FMCGJr:b+KH4kpc+DX/0HnFdG
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4272278488\3302449443.pri SecHealthUI.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4344 3920 WerFault.exe 70 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1128 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2256 FMod_Launcher (1).exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2256 FMod_Launcher (1).exe 2256 FMod_Launcher (1).exe 3920 SecHealthUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1484 wrote to memory of 1128 1484 cmd.exe 82 PID 1484 wrote to memory of 1128 1484 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\FMod_Launcher (1).exe"C:\Users\Admin\AppData\Local\Temp\FMod_Launcher (1).exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2256
-
C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SecHealthUI.exe"C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SecHealthUI.exe" -ServerName:SecHealthUI.AppXep4x2tbtjws1v9qqs0rmb3hxykvkpqtn.mca1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3920 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3920 -s 16682⤵
- Program crash
PID:4344
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4220
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\system32\ipconfig.exeipconfig2⤵
- Gathers network information
PID:1128
-