Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 05:40
Behavioral task
behavioral1
Sample
ad08584c525066f399a30dd03f4ca596.exe
Resource
win7-20230220-en
General
-
Target
ad08584c525066f399a30dd03f4ca596.exe
-
Size
77KB
-
MD5
ad08584c525066f399a30dd03f4ca596
-
SHA1
ced14e862f8bb80de80c11bc02b4e4d4a0834389
-
SHA256
e53dc87e496e8b9e798419bbbdc6ab953d7f1d08a54546cb3b2aabced1b88bed
-
SHA512
40d435cd785280e6dd6dd3eb914da9249fe8a11fd7ecc78b1a3672de3843e9efd39676d898af8bb0cf376e50c6c7d91f2df8081d94906437e611e5ca87bd2ae8
-
SSDEEP
1536:mRxiXCIQg7XVSynL5C9b7OLYRVSUqoWG4zbVwxStmMgc:I4ZQg7FSyL5gb7GCzqNG4dNxgc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
blqrr.exepid process 4304 blqrr.exe -
Processes:
resource yara_rule behavioral2/memory/4632-133-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/4632-134-0x0000000000400000-0x000000000044E000-memory.dmp upx C:\ProgramData\urbt\blqrr.exe upx C:\ProgramData\urbt\blqrr.exe upx behavioral2/memory/4304-150-0x0000000000400000-0x000000000044E000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
Processes:
ad08584c525066f399a30dd03f4ca596.exedescription ioc process File created C:\Windows\Tasks\corolina17.job ad08584c525066f399a30dd03f4ca596.exe File opened for modification C:\Windows\Tasks\corolina17.job ad08584c525066f399a30dd03f4ca596.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1276 4632 WerFault.exe ad08584c525066f399a30dd03f4ca596.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ad08584c525066f399a30dd03f4ca596.exepid process 4632 ad08584c525066f399a30dd03f4ca596.exe 4632 ad08584c525066f399a30dd03f4ca596.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad08584c525066f399a30dd03f4ca596.exe"C:\Users\Admin\AppData\Local\Temp\ad08584c525066f399a30dd03f4ca596.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 4842⤵
- Program crash
PID:1276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4632 -ip 46321⤵PID:5032
-
C:\ProgramData\urbt\blqrr.exeC:\ProgramData\urbt\blqrr.exe start21⤵
- Executes dropped EXE
PID:4304
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5ad08584c525066f399a30dd03f4ca596
SHA1ced14e862f8bb80de80c11bc02b4e4d4a0834389
SHA256e53dc87e496e8b9e798419bbbdc6ab953d7f1d08a54546cb3b2aabced1b88bed
SHA51240d435cd785280e6dd6dd3eb914da9249fe8a11fd7ecc78b1a3672de3843e9efd39676d898af8bb0cf376e50c6c7d91f2df8081d94906437e611e5ca87bd2ae8
-
Filesize
77KB
MD5ad08584c525066f399a30dd03f4ca596
SHA1ced14e862f8bb80de80c11bc02b4e4d4a0834389
SHA256e53dc87e496e8b9e798419bbbdc6ab953d7f1d08a54546cb3b2aabced1b88bed
SHA51240d435cd785280e6dd6dd3eb914da9249fe8a11fd7ecc78b1a3672de3843e9efd39676d898af8bb0cf376e50c6c7d91f2df8081d94906437e611e5ca87bd2ae8