Analysis
-
max time kernel
28s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-04-2023 14:52
Static task
static1
Behavioral task
behavioral1
Sample
Ambrosial (1).exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Ambrosial (1).exe
Resource
win10v2004-20230220-en
General
-
Target
Ambrosial (1).exe
-
Size
15.9MB
-
MD5
596b0f4684d45de83c204967c06e48a3
-
SHA1
933dc2dc29a17a9447c944289fed4f98e0eb5e5f
-
SHA256
6ff53b8187d0d3e287ad9ce3da20eca4f9dd105a2e3421ca1ad73b533ec4b91a
-
SHA512
8f50098d120d32a84347a8337dee27061a6914d66b951f930d491a81a9804317318f25f80467684fd4fecea6bccc6de38b2df3ee2742a54805f2cdb4413d3830
-
SSDEEP
196608:64WxsIO2gfRMhSE8/Erd8QP+ih91qBpodTAIRq+2vBt:64WuIO2gfRMYbcr6QP391qBafC
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
Ambrosial (1).exedescription ioc process File created C:\Windows\Fonts\Azonix.otf Ambrosial (1).exe File opened for modification C:\Windows\Fonts\Azonix.otf Ambrosial (1).exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 944 1408 WerFault.exe Ambrosial (1).exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Ambrosial (1).exedescription pid process target process PID 1408 wrote to memory of 944 1408 Ambrosial (1).exe WerFault.exe PID 1408 wrote to memory of 944 1408 Ambrosial (1).exe WerFault.exe PID 1408 wrote to memory of 944 1408 Ambrosial (1).exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ambrosial (1).exe"C:\Users\Admin\AppData\Local\Temp\Ambrosial (1).exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1408 -s 5922⤵
- Program crash
PID:944
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5cdfe47b31e9184a55cf02eef1baf7240
SHA1b8825c605434d572f5277be0283d5a9b2cde59e4
SHA25651a65e5c09bf27980adf640cb54cb2a5bbb217fdaab79b377e158f92533362a9
SHA512a2e5141c0f7ca72bcf5b1a303fce1734953d83ad363d4c3c7d8786e1bfd872a6b96eeabce3740b547a5447e255415cdf688a0d2074cecfaa0c54c49d0f2882c5