Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2023 19:50
Static task
static1
Behavioral task
behavioral1
Sample
f14fabcebb48fd9b0ec5ee530d757d20_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f14fabcebb48fd9b0ec5ee530d757d20_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
f14fabcebb48fd9b0ec5ee530d757d20_exe32.exe
-
Size
911KB
-
MD5
f14fabcebb48fd9b0ec5ee530d757d20
-
SHA1
236f33711f31c4bb74096be1ecbb2ea8b71c413e
-
SHA256
7999f5ba883df787e30826bd802ef0817e0c96470b4de4e6fdcaddca6596641b
-
SHA512
822a960a81ee427643f974341a240c8e086a2024138385fedfed8d11e86328fa3d8b5e3cdad22de25ad65f0527136fddcd6c9a59f1421f2526d3ddbee8a63ceb
-
SSDEEP
24576:5c//////G6hGzPK5YtjjbvKewjDsPNwwrau1Vi9WTU04bTVT8Fhpu8:5c//////rGzPK5YtHbi9fsPCwRvi9Wjj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4300 duokai.exe 4812 MDMPatch1.0.exe 632 xinmdm.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\MDMPatch1.0.exe f14fabcebb48fd9b0ec5ee530d757d20_exe32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\duokai.exe f14fabcebb48fd9b0ec5ee530d757d20_exe32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4052 4300 WerFault.exe 89 4208 632 WerFault.exe 92 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 824 wrote to memory of 1528 824 f14fabcebb48fd9b0ec5ee530d757d20_exe32.exe 83 PID 824 wrote to memory of 1528 824 f14fabcebb48fd9b0ec5ee530d757d20_exe32.exe 83 PID 824 wrote to memory of 1528 824 f14fabcebb48fd9b0ec5ee530d757d20_exe32.exe 83 PID 824 wrote to memory of 1656 824 f14fabcebb48fd9b0ec5ee530d757d20_exe32.exe 85 PID 824 wrote to memory of 1656 824 f14fabcebb48fd9b0ec5ee530d757d20_exe32.exe 85 PID 824 wrote to memory of 1656 824 f14fabcebb48fd9b0ec5ee530d757d20_exe32.exe 85 PID 824 wrote to memory of 4100 824 f14fabcebb48fd9b0ec5ee530d757d20_exe32.exe 84 PID 824 wrote to memory of 4100 824 f14fabcebb48fd9b0ec5ee530d757d20_exe32.exe 84 PID 824 wrote to memory of 4100 824 f14fabcebb48fd9b0ec5ee530d757d20_exe32.exe 84 PID 1656 wrote to memory of 4300 1656 cmd.exe 89 PID 1656 wrote to memory of 4300 1656 cmd.exe 89 PID 1656 wrote to memory of 4300 1656 cmd.exe 89 PID 1528 wrote to memory of 4812 1528 cmd.exe 90 PID 1528 wrote to memory of 4812 1528 cmd.exe 90 PID 1528 wrote to memory of 4812 1528 cmd.exe 90 PID 4100 wrote to memory of 632 4100 cmd.exe 92 PID 4100 wrote to memory of 632 4100 cmd.exe 92 PID 4100 wrote to memory of 632 4100 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f14fabcebb48fd9b0ec5ee530d757d20_exe32.exe"C:\Users\Admin\AppData\Local\Temp\f14fabcebb48fd9b0ec5ee530d757d20_exe32.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Windows\system32\MDMPatch1.0.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\MDMPatch1.0.exeC:\Windows\system32\MDMPatch1.0.exe3⤵
- Executes dropped EXE
PID:4812
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\\xinmdm.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\xinmdm.exeC:\Users\Admin\AppData\Local\Temp\\xinmdm.exe3⤵
- Executes dropped EXE
PID:632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 4084⤵
- Program crash
PID:4208
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Windows\duokai.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\duokai.exeC:\Windows\duokai.exe3⤵
- Executes dropped EXE
PID:4300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 2244⤵
- Program crash
PID:4052
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4300 -ip 43001⤵PID:720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 632 -ip 6321⤵PID:1356
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD53caf43d77d7c2c5705cb53000e27590b
SHA1c8e8299dabc520716bd9cf2f7ca702424de22592
SHA25666b5f42c03fd364ae034e63ad5b9d855f89965d12f80e4ca231cb89e7a9d6218
SHA512b90c0b2c03324f5814cf5310c99538ffeaf3c35b5c89dd4bd2c8d134d540be78d1e0054ae718a6f232b6e49b8294a4a7699d88b77eaeef69c70551b361f1073e
-
Filesize
36KB
MD53caf43d77d7c2c5705cb53000e27590b
SHA1c8e8299dabc520716bd9cf2f7ca702424de22592
SHA25666b5f42c03fd364ae034e63ad5b9d855f89965d12f80e4ca231cb89e7a9d6218
SHA512b90c0b2c03324f5814cf5310c99538ffeaf3c35b5c89dd4bd2c8d134d540be78d1e0054ae718a6f232b6e49b8294a4a7699d88b77eaeef69c70551b361f1073e
-
Filesize
479KB
MD516a5208385f15645c54110a2ac18485b
SHA1b4ae149966e5a234b9d62d68c2159fb6eec7b209
SHA256a407a6eb055b10de9e48a6c5ad54dbfd0254973402d3287200eb8e19d06d2c78
SHA512eda363ba527fd7f5963b8123784ee51b91abf6ba46d6046a792245d5bea0095586ad290a0cbc77f310ad50ca462148bef39396b679cfe6fc44f3288fc95966af
-
Filesize
479KB
MD516a5208385f15645c54110a2ac18485b
SHA1b4ae149966e5a234b9d62d68c2159fb6eec7b209
SHA256a407a6eb055b10de9e48a6c5ad54dbfd0254973402d3287200eb8e19d06d2c78
SHA512eda363ba527fd7f5963b8123784ee51b91abf6ba46d6046a792245d5bea0095586ad290a0cbc77f310ad50ca462148bef39396b679cfe6fc44f3288fc95966af
-
Filesize
362KB
MD5b5f1abea8ea405c51a1f3fe0ce3d9c68
SHA16d9cbeeae8dc78cc474bab2cbea6d415d1f68e31
SHA256d9c6405c7c3abf6f971967b5fbbd4861f5f6f8cdba7385ef31d47780159ead1b
SHA512fd3d49d616f5c459d7b942c360e5bc576bfaef9ad4f29d71cb5cccdc4380477ea501942768f4f13bfbacdf0d4fe447de05d1fc82072e1b901b47e29fa5038e92
-
Filesize
362KB
MD5b5f1abea8ea405c51a1f3fe0ce3d9c68
SHA16d9cbeeae8dc78cc474bab2cbea6d415d1f68e31
SHA256d9c6405c7c3abf6f971967b5fbbd4861f5f6f8cdba7385ef31d47780159ead1b
SHA512fd3d49d616f5c459d7b942c360e5bc576bfaef9ad4f29d71cb5cccdc4380477ea501942768f4f13bfbacdf0d4fe447de05d1fc82072e1b901b47e29fa5038e92