Analysis
-
max time kernel
140s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 10:34
Behavioral task
behavioral1
Sample
3e7ff2e6ac3db1ee2711bf4bcf4d012fcf5cbf8dc375ebf9df8fd35ffe9b417b.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3e7ff2e6ac3db1ee2711bf4bcf4d012fcf5cbf8dc375ebf9df8fd35ffe9b417b.exe
Resource
win10v2004-20230703-en
General
-
Target
3e7ff2e6ac3db1ee2711bf4bcf4d012fcf5cbf8dc375ebf9df8fd35ffe9b417b.exe
-
Size
2.8MB
-
MD5
d25148655887edcaec70f569cd28d714
-
SHA1
63da57a3a4aeb7478126dd77314a361b134f4f53
-
SHA256
3e7ff2e6ac3db1ee2711bf4bcf4d012fcf5cbf8dc375ebf9df8fd35ffe9b417b
-
SHA512
3316721493fca139bdff914c8e6b632b384adcc72546235066ec416506b440fa9977e3c4ab5cd389fcdef09fb37462b38ca0df4c4a4b22227d05fedc534c5a28
-
SSDEEP
49152:l51Z7F25DNGy3g9lRC8mk62yFjqGAuf75pqjf8jJPfs/kfwMflf0hchZgtyej:l515F2W+8ClgduD59fVfwM/aB
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4420-133-0x0000000000AF0000-0x0000000001434000-memory.dmp upx behavioral2/memory/4420-169-0x0000000000AF0000-0x0000000001434000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4140 4420 WerFault.exe 79 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 3e7ff2e6ac3db1ee2711bf4bcf4d012fcf5cbf8dc375ebf9df8fd35ffe9b417b.exe Set value (int) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\3e7ff2e6ac3db1ee2711bf4bcf4d012fcf5cbf8dc375ebf9df8fd35ffe9b417b.exe = "11001" 3e7ff2e6ac3db1ee2711bf4bcf4d012fcf5cbf8dc375ebf9df8fd35ffe9b417b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4420 3e7ff2e6ac3db1ee2711bf4bcf4d012fcf5cbf8dc375ebf9df8fd35ffe9b417b.exe 4420 3e7ff2e6ac3db1ee2711bf4bcf4d012fcf5cbf8dc375ebf9df8fd35ffe9b417b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e7ff2e6ac3db1ee2711bf4bcf4d012fcf5cbf8dc375ebf9df8fd35ffe9b417b.exe"C:\Users\Admin\AppData\Local\Temp\3e7ff2e6ac3db1ee2711bf4bcf4d012fcf5cbf8dc375ebf9df8fd35ffe9b417b.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 18562⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4420 -ip 44201⤵PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD518d4529e99a898e41b49178111edc235
SHA12d15cc2c4cae620db158024a29407351878526ab
SHA25613c952c9dab374ee2ef3de41f2ab5f9d1b488f94f5400498e69bb18bc68bc00b
SHA512e35a072f6aaae8ac111a1b9377d6f86fc47f6064860f07a73b3c8831b4ce4f3d159c5005ce72983a05e3607946a3e42c5803fd2ee5b4b42a7d13511c1abf1341
-
Filesize
426B
MD5a28ab17b18ff254173dfeef03245efd0
SHA1c6ce20924565644601d4e0dd0fba9dde8dea5c77
SHA256886c0ab69e6e9d9d5b5909451640ea587accfcdf11b8369cad8542d1626ac375
SHA5129371a699921b028bd93c35f9f2896d9997b906c8aba90dd4279abba0ae1909a8808a43bf829584e552ccfe534b2c991a5a7e3e3de7618343f50b1c47cff269d6