Analysis
-
max time kernel
111s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 06:21
Behavioral task
behavioral1
Sample
fb5b8381c896aa6908b76900fa1e2f75f653a64ec4d00b3afbc8a81fcf07eba7.exe
Resource
win7-20230712-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
fb5b8381c896aa6908b76900fa1e2f75f653a64ec4d00b3afbc8a81fcf07eba7.exe
Resource
win10v2004-20230824-en
6 signatures
150 seconds
General
-
Target
fb5b8381c896aa6908b76900fa1e2f75f653a64ec4d00b3afbc8a81fcf07eba7.exe
-
Size
8.7MB
-
MD5
e8e8cf7821915da7b1f04ff6930b7e07
-
SHA1
6fd4bb8a777cb4c732d319fc7b485e5a01037030
-
SHA256
fb5b8381c896aa6908b76900fa1e2f75f653a64ec4d00b3afbc8a81fcf07eba7
-
SHA512
54258afa73d1af5589a9f8db3d30a3db37c00c1d505bbf5fce3e93bb7e1ceb4b965cd9ddc8da596d5a6f8af472ba1426e2b216f8d00a22038f60f1ae290a25a6
-
SSDEEP
196608:D6nmOG+MxcBD0kvbbVViXEoyxf+lHb6e6SQDi46eE7wUAwGDx0cJDR:D6nmOG+MSg6b6XEoN6SQDiRbw2KDR
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3784-1-0x0000000000CC0000-0x0000000001DF8000-memory.dmp themida behavioral2/memory/3784-7-0x0000000000CC0000-0x0000000001DF8000-memory.dmp themida behavioral2/memory/3784-8-0x0000000000CC0000-0x0000000001DF8000-memory.dmp themida behavioral2/memory/3784-11-0x0000000000CC0000-0x0000000001DF8000-memory.dmp themida behavioral2/memory/3784-12-0x0000000000CC0000-0x0000000001DF8000-memory.dmp themida behavioral2/memory/3784-13-0x0000000000CC0000-0x0000000001DF8000-memory.dmp themida behavioral2/memory/3784-14-0x0000000000CC0000-0x0000000001DF8000-memory.dmp themida behavioral2/memory/3784-15-0x0000000000CC0000-0x0000000001DF8000-memory.dmp themida behavioral2/memory/3784-16-0x0000000000CC0000-0x0000000001DF8000-memory.dmp themida behavioral2/memory/3784-17-0x0000000000CC0000-0x0000000001DF8000-memory.dmp themida behavioral2/memory/3784-18-0x0000000000CC0000-0x0000000001DF8000-memory.dmp themida behavioral2/memory/3784-21-0x0000000000CC0000-0x0000000001DF8000-memory.dmp themida -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{F7AE49E3-D69E-4544-AF56-1FEC22EF7796}.catalogItem svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3784 fb5b8381c896aa6908b76900fa1e2f75f653a64ec4d00b3afbc8a81fcf07eba7.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4340 3784 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3784 fb5b8381c896aa6908b76900fa1e2f75f653a64ec4d00b3afbc8a81fcf07eba7.exe 3784 fb5b8381c896aa6908b76900fa1e2f75f653a64ec4d00b3afbc8a81fcf07eba7.exe 3784 fb5b8381c896aa6908b76900fa1e2f75f653a64ec4d00b3afbc8a81fcf07eba7.exe 3784 fb5b8381c896aa6908b76900fa1e2f75f653a64ec4d00b3afbc8a81fcf07eba7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3784 fb5b8381c896aa6908b76900fa1e2f75f653a64ec4d00b3afbc8a81fcf07eba7.exe
Processes
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:3540
-
C:\Users\Admin\AppData\Local\Temp\fb5b8381c896aa6908b76900fa1e2f75f653a64ec4d00b3afbc8a81fcf07eba7.exe"C:\Users\Admin\AppData\Local\Temp\fb5b8381c896aa6908b76900fa1e2f75f653a64ec4d00b3afbc8a81fcf07eba7.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 7642⤵
- Program crash
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3784 -ip 37841⤵PID:3204