Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 08:48
Static task
static1
Behavioral task
behavioral1
Sample
a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe
Resource
win10v2004-20230915-en
General
-
Target
a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe
-
Size
9.4MB
-
MD5
f9bd5acb9ce5486488df9fd1cf450f86
-
SHA1
607f09f6520e99e6a03d4e84613b7c82f7550c8c
-
SHA256
a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6
-
SHA512
b17bf5b167f2f07aa44f0ccc3e06348e128a0a77118e97d3797d0f227f0e813538daf1760d54d4b19fd0b184d33ba75b7cb2a429a458aa31e166d258d28f1d5a
-
SSDEEP
196608:YVK3iLPy/eJ9O9+5DWPHfbhVma0UE98msIl8JjsBa4g6bOzB+ik0VWOFFqoTOuir:t3iOWo+5CffbhVmj8p+8JABa4gJ920Vq
Malware Config
Signatures
-
Detected phishing page
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4308 780 WerFault.exe 84 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe Set value (int) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe Set value (int) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Software\Microsoft\Internet Explorer\International\CpMRU a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe Set value (int) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 780 a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe 780 a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe 780 a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe 780 a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 780 wrote to memory of 5012 780 a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe 88 PID 780 wrote to memory of 5012 780 a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe 88 PID 780 wrote to memory of 5012 780 a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe 88 PID 780 wrote to memory of 5056 780 a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe 89 PID 780 wrote to memory of 5056 780 a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe 89 PID 780 wrote to memory of 5056 780 a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe"C:\Users\Admin\AppData\Local\Temp\a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*7a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exe"2⤵PID:5012
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*.dll"2⤵PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 780 -s 26122⤵
- Program crash
PID:4308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 780 -ip 7801⤵PID:4504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\a807a670420f124b0feeceb1d937d5effded8cb1df245927f024a1c187fe02b6.exepack.tmp
Filesize2KB
MD51e9aa49dfc0f270141464dfb112b1014
SHA166ae598af6629377bb48312b50ae60f2ce6b4856
SHA256492ec7c6fb2d7abcdf2c91838043e8c93e26d84c50c15cce19db15da492ce473
SHA512da61093f173540a8c96361067f7554183b1b732d30aece418c62c6dc98600f02c91ceedead2574f724cee1905342d2f15ca2b66fea51c935f22eceab6fa567b0
-
Filesize
1KB
MD595566e343047442fba9b30c409a8d357
SHA1887e8c4ff8e90a94bc9d5dc42732ed3f0bc349db
SHA256d8e278b00512b721439ab533a7999d578a367f1cbf421dad9d9313ea98827187
SHA5129d3af259cf79a0fa45ff3b8f7d4a83b0d91827ad195250c38357c10ace714c625b6abc386b5dc2552a17a757958f2d04ed365a17231e5e2850e30e8351f189bf
-
Filesize
1KB
MD543448a5eb23e9b620b362b823ad48362
SHA1238a0456e00a9d53688e6295de04b80b61a9c470
SHA256ed1e933d53e44ae7f0d6b745ce370c638c7b19f72c91e70b161d735be8010b65
SHA512c3fbe34a486c96c514b43ce808d865f5c4f99558bdbce0adf1d7ee0c233c5e8e76b47bddf81bb8415171ca5427fdb9f5f72fe5cf936c6ea34547de317828f5fc