Overview
overview
10Static
static
105876075002...b6.exe
windows7-x64
704759c790...5c.exe
windows7-x64
1970037fcb6...3c.exe
windows7-x64
1a8105a507c...75.exe
windows7-x64
10a8d0b4e9ce...d5.exe
windows7-x64
3a9d3c169fa...c4.exe
windows7-x64
3ae05c84201...82.exe
windows7-x64
5b1b63696c4...62.exe
windows7-x64
3b59f8014e9...07.exe
windows7-x64
8b99c904be5...ce.exe
windows7-x64
3bd5d3ebe61...b3.exe
windows7-x64
7c25b0b627e...b7.dll
windows7-x64
6c84a02a0b3...6c.exe
windows7-x64
7eb135d0764...f8.exe
windows7-x64
10f10e957b92...41.exe
windows7-x64
8f56dff5596...43.exe
windows7-x64
1fa4e1cb3e4...c0.exe
windows7-x64
3Analysis
-
max time kernel
41s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07-09-2023 14:15
Behavioral task
behavioral1
Sample
58760750029ed58aaede88892b1c5d81a525adb2bbb5aee7e48f927d43df44b6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
704759c7903cc2f0962bac0f7e7318dbbce0323b561c87d0d4bfc4cf2fd5dc5c.exe
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
970037fcb645a7e538ac06f1e0bc9b8c273930187ab919b7810ae7b2bc034f3c.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
a8105a507cda24d05f6a7488e72ac7f8169ef1b1626fdd479630ecfe5141a375.exe
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
a8d0b4e9ce9177ba96fb45bc49e70d31e73fec8d52a3460369563b872dd40bd5.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
a9d3c169fa67ac9e0c8165d67d6baf44419b48fc420b655147f58d3aa6afd3c4.exe
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
ae05c8420119e05563a9dbc02cd1d3d854e6cbddbbb8d90b1fc4469f2975a982.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
b1b63696c4a99f6dbb1eaaa751d635ad5cdbfa792981c40365b77399f3632662.exe
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
b59f8014e92f8236b4045a1d002de6cd22402262d031609b69b2a9b2b9055807.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
b99c904be547228d5a2db0522243a158a3bc0c6cfc901012944457daada602ce.exe
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
bd5d3ebe6150f53c1535e1667a18bbd4831751a414e7518dc8e1d15a19db95b3.exe
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
c25b0b627ea052c67ef549e1040e5a33779f8661172c2df6420de1d2b228f7b7.dll
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
c84a02a0b3cfe2af4c0c04c7ca69351a41501034bde0bb682ecb884b4e8aa36c.exe
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
eb135d0764932501b0122620e2b7a7ca5b56786d1a937871372ae989609cc3f8.exe
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
f10e957b92fbb2bb57e0a51eeda99dedb1b0720a1be0422b53404d3252bef741.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
f56dff55960cfb47416bebe71dca6effff8fc1a7066b0e0a965b94c3253e1943.exe
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
fa4e1cb3e41e49004906adc5e9a22c484d18439fd84611d72f5c4fcac445f1c0.exe
Resource
win7-20230831-en
General
-
Target
b99c904be547228d5a2db0522243a158a3bc0c6cfc901012944457daada602ce.exe
-
Size
63KB
-
MD5
5c2bde97438d98edb3dd2a755aa12339
-
SHA1
6cd4a3bab1d639d43cb687c5f3a31da96ed6a981
-
SHA256
b99c904be547228d5a2db0522243a158a3bc0c6cfc901012944457daada602ce
-
SHA512
05b09f329c5262884ffb1c26881548cb0c054786c8ae71728e5642ae1b1eb4ef09dbc197ae67f7f5a4ba16b331a12ae5c0ee5c74fcc6b3ae0f38c067742ea7e6
-
SSDEEP
768:ROwlvI5QKedEGn9qeNXalsFHp1fDaAL7X07dsYmTCknHq4OXxAiTqF6:ROwijynylifDaAX07dsYcnnon
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1048 1964 WerFault.exe b99c904be547228d5a2db0522243a158a3bc0c6cfc901012944457daada602ce.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
b99c904be547228d5a2db0522243a158a3bc0c6cfc901012944457daada602ce.exepid process 1964 b99c904be547228d5a2db0522243a158a3bc0c6cfc901012944457daada602ce.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b99c904be547228d5a2db0522243a158a3bc0c6cfc901012944457daada602ce.exedescription pid process Token: SeTakeOwnershipPrivilege 1964 b99c904be547228d5a2db0522243a158a3bc0c6cfc901012944457daada602ce.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b99c904be547228d5a2db0522243a158a3bc0c6cfc901012944457daada602ce.exedescription pid process target process PID 1964 wrote to memory of 1048 1964 b99c904be547228d5a2db0522243a158a3bc0c6cfc901012944457daada602ce.exe WerFault.exe PID 1964 wrote to memory of 1048 1964 b99c904be547228d5a2db0522243a158a3bc0c6cfc901012944457daada602ce.exe WerFault.exe PID 1964 wrote to memory of 1048 1964 b99c904be547228d5a2db0522243a158a3bc0c6cfc901012944457daada602ce.exe WerFault.exe PID 1964 wrote to memory of 1048 1964 b99c904be547228d5a2db0522243a158a3bc0c6cfc901012944457daada602ce.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b99c904be547228d5a2db0522243a158a3bc0c6cfc901012944457daada602ce.exe"C:\Users\Admin\AppData\Local\Temp\b99c904be547228d5a2db0522243a158a3bc0c6cfc901012944457daada602ce.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 2842⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1964-0-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/1964-3-0x0000000077230000-0x0000000077231000-memory.dmpFilesize
4KB
-
memory/1964-5-0x0000000001F60000-0x0000000001F6B000-memory.dmpFilesize
44KB
-
memory/1964-6-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/1964-7-0x0000000001F60000-0x0000000001F6B000-memory.dmpFilesize
44KB