Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2023 20:33
Behavioral task
behavioral1
Sample
f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe
Resource
win10v2004-20230703-en
General
-
Target
f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe
-
Size
10.6MB
-
MD5
c6d3593f79e00d002f3393c7613fa590
-
SHA1
606371e8caea5cd12de5eec0a6a69070b01d6001
-
SHA256
f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70
-
SHA512
c7316b2c4fad684b182825c4d20d7b1cce84d45d7294854c2ce9898b130a19097bd9160f10c42b8128771f32967e393db90872a40281f4b14811655dc6975b80
-
SSDEEP
196608:tQpH0Fx5ogvPYOrs1UalsCN99veeSk6LI9C0brLbDZ0IHK/IzAZyn2ah7dLj:tnfYOQ1UalvN9FWIAYLfNHKwz+i2apdL
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4584-148-0x0000000000400000-0x0000000000F72000-memory.dmp upx behavioral2/memory/4584-158-0x0000000000400000-0x0000000000F72000-memory.dmp upx behavioral2/memory/4584-163-0x0000000000400000-0x0000000000F72000-memory.dmp upx behavioral2/memory/4584-169-0x0000000000400000-0x0000000000F72000-memory.dmp upx behavioral2/memory/4584-177-0x0000000000400000-0x0000000000F72000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\K: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\R: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\Y: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\W: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\E: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\N: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\T: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\U: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\Q: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\X: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\J: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\L: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\M: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\O: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\V: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\Z: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\G: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\H: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\P: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\S: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4900 3084 WerFault.exe 80 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4584 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87 PID 3084 wrote to memory of 4584 3084 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe"C:\Users\Admin\AppData\Local\Temp\f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 1842⤵
- Program crash
PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe"C:\Users\Admin\AppData\Local\Temp\f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe"2⤵
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3084 -ip 30841⤵PID:4080