Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/11/2023, 19:06

General

  • Target

    0a8bb692f90c169a101aacc14579e834.exe

  • Size

    8.6MB

  • MD5

    0a8bb692f90c169a101aacc14579e834

  • SHA1

    7948a3c82b5a35346ec807dfbc75ce9931300a43

  • SHA256

    72c9c9e1eaf489bf5487c24d49590d141faa40bdce2469137d098490364b0a12

  • SHA512

    79024a3ccefb01917cd453142b1f2e4bc5faac62e0173431e53bd6eabdc5e92df68322ce43e9b07a352609bfb5343fcff68853d22316cc22250169041ec312e3

  • SSDEEP

    196608:wcGhVO9dMEwx74OlXg7/dOa4FZCkEafF2m9i/jVfegASl1ry3X:wcGv6MhPFQoW+N2mEfegAf3X

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a8bb692f90c169a101aacc14579e834.exe
    "C:\Users\Admin\AppData\Local\Temp\0a8bb692f90c169a101aacc14579e834.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4388
    • C:\Users\Admin\AppData\Local\Temp\is-P6D5P.tmp\0a8bb692f90c169a101aacc14579e834.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-P6D5P.tmp\0a8bb692f90c169a101aacc14579e834.tmp" /SL5="$90048,8820754,58368,C:\Users\Admin\AppData\Local\Temp\0a8bb692f90c169a101aacc14579e834.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:4368
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Delete /F /TN "CDL1102-2"
        3⤵
          PID:1604
        • C:\Program Files (x86)\CDrivelib\CDrivelib.exe
          "C:\Program Files (x86)\CDrivelib\CDrivelib.exe"
          3⤵
          • Executes dropped EXE
          PID:2192
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 944
            4⤵
            • Program crash
            PID:2492
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 968
            4⤵
            • Program crash
            PID:4196
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 864
            4⤵
            • Program crash
            PID:2884
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 140
            4⤵
            • Program crash
            PID:1968
        • C:\Program Files (x86)\CDrivelib\CDrivelib.exe
          "C:\Program Files (x86)\CDrivelib\CDrivelib.exe" fcf40d01a5f896106625cc0d4537f9a8
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2216
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 924
            4⤵
            • Program crash
            PID:1764
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 936
            4⤵
            • Program crash
            PID:68
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 932
            4⤵
            • Program crash
            PID:1668
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 1136
            4⤵
            • Program crash
            PID:2816
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 1160
            4⤵
            • Program crash
            PID:2772
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 1224
            4⤵
            • Program crash
            PID:3276
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 1232
            4⤵
            • Program crash
            PID:3548
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 1376
            4⤵
            • Program crash
            PID:2492
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 1384
            4⤵
            • Program crash
            PID:3952
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 1048
            4⤵
            • Program crash
            PID:4604
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 948
            4⤵
            • Program crash
            PID:3648
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Query
          3⤵
            PID:4648
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2192 -ip 2192
        1⤵
          PID:1888
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2192 -ip 2192
          1⤵
            PID:816
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2192 -ip 2192
            1⤵
              PID:2196
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2192 -ip 2192
              1⤵
                PID:4008
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2216 -ip 2216
                1⤵
                  PID:488
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2216 -ip 2216
                  1⤵
                    PID:1120
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2216 -ip 2216
                    1⤵
                      PID:3844
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2216 -ip 2216
                      1⤵
                        PID:4380
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2216 -ip 2216
                        1⤵
                          PID:1592
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2216 -ip 2216
                          1⤵
                            PID:4068
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2216 -ip 2216
                            1⤵
                              PID:3444
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2216 -ip 2216
                              1⤵
                                PID:4428
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2216 -ip 2216
                                1⤵
                                  PID:4088
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2216 -ip 2216
                                  1⤵
                                    PID:2016
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2216 -ip 2216
                                    1⤵
                                      PID:3396

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Program Files (x86)\CDrivelib\CDrivelib.exe

                                      Filesize

                                      6.1MB

                                      MD5

                                      1329e0e2133676dc92e5c19f4bad97c8

                                      SHA1

                                      354cea317e5f26004f7bd64043af794a9ef57c18

                                      SHA256

                                      82069fd3d25fe4da911ee1865eec3bbac3fd44cc85d21412c948999ad3588742

                                      SHA512

                                      a535d85a239411de19e72fba7cd30efd826f8735a3daa55c2f17ec8a46974abe347f0912887c78212ffc38eb33d079921b6163fb6b6d17d05eda97c57cb17515

                                    • C:\Program Files (x86)\CDrivelib\CDrivelib.exe

                                      Filesize

                                      6.1MB

                                      MD5

                                      1329e0e2133676dc92e5c19f4bad97c8

                                      SHA1

                                      354cea317e5f26004f7bd64043af794a9ef57c18

                                      SHA256

                                      82069fd3d25fe4da911ee1865eec3bbac3fd44cc85d21412c948999ad3588742

                                      SHA512

                                      a535d85a239411de19e72fba7cd30efd826f8735a3daa55c2f17ec8a46974abe347f0912887c78212ffc38eb33d079921b6163fb6b6d17d05eda97c57cb17515

                                    • C:\Program Files (x86)\CDrivelib\CDrivelib.exe

                                      Filesize

                                      6.1MB

                                      MD5

                                      1329e0e2133676dc92e5c19f4bad97c8

                                      SHA1

                                      354cea317e5f26004f7bd64043af794a9ef57c18

                                      SHA256

                                      82069fd3d25fe4da911ee1865eec3bbac3fd44cc85d21412c948999ad3588742

                                      SHA512

                                      a535d85a239411de19e72fba7cd30efd826f8735a3daa55c2f17ec8a46974abe347f0912887c78212ffc38eb33d079921b6163fb6b6d17d05eda97c57cb17515

                                    • C:\Users\Admin\AppData\Local\Temp\is-P6D5P.tmp\0a8bb692f90c169a101aacc14579e834.tmp

                                      Filesize

                                      677KB

                                      MD5

                                      d412155b8fe89c866db990149c21e574

                                      SHA1

                                      663fd434d76ae906c8a747000fc228d864d565be

                                      SHA256

                                      4f15ef0a66130b00ac3f261caec621c5d43f32b58fefb1c66c0df0fdc7f8c5c0

                                      SHA512

                                      c15bc864ad4ffac9f66d058ddae4de838249d5a08dfc2618414bcaf28b39489d8753a1683f4f7d4f4fddc6b7e5da54f6ddd0c5e5eae44ce782b2b79e331795b7

                                    • C:\Users\Admin\AppData\Local\Temp\is-P6D5P.tmp\0a8bb692f90c169a101aacc14579e834.tmp

                                      Filesize

                                      677KB

                                      MD5

                                      d412155b8fe89c866db990149c21e574

                                      SHA1

                                      663fd434d76ae906c8a747000fc228d864d565be

                                      SHA256

                                      4f15ef0a66130b00ac3f261caec621c5d43f32b58fefb1c66c0df0fdc7f8c5c0

                                      SHA512

                                      c15bc864ad4ffac9f66d058ddae4de838249d5a08dfc2618414bcaf28b39489d8753a1683f4f7d4f4fddc6b7e5da54f6ddd0c5e5eae44ce782b2b79e331795b7

                                    • C:\Users\Admin\AppData\Local\Temp\is-UATV5.tmp\_isetup\_iscrypt.dll

                                      Filesize

                                      2KB

                                      MD5

                                      a69559718ab506675e907fe49deb71e9

                                      SHA1

                                      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                      SHA256

                                      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                      SHA512

                                      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                    • memory/2192-161-0x0000000003D10000-0x0000000003D11000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2192-165-0x0000000000400000-0x0000000000E22000-memory.dmp

                                      Filesize

                                      10.1MB

                                    • memory/2192-158-0x0000000000400000-0x0000000000E22000-memory.dmp

                                      Filesize

                                      10.1MB

                                    • memory/2192-159-0x0000000000400000-0x0000000000E22000-memory.dmp

                                      Filesize

                                      10.1MB

                                    • memory/2192-160-0x0000000000400000-0x0000000000E22000-memory.dmp

                                      Filesize

                                      10.1MB

                                    • memory/2216-170-0x0000000003BD0000-0x0000000003BD1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2216-167-0x0000000000400000-0x0000000000E22000-memory.dmp

                                      Filesize

                                      10.1MB

                                    • memory/2216-169-0x0000000000400000-0x0000000000E22000-memory.dmp

                                      Filesize

                                      10.1MB

                                    • memory/2216-174-0x0000000000400000-0x0000000000E22000-memory.dmp

                                      Filesize

                                      10.1MB

                                    • memory/2216-177-0x0000000000400000-0x0000000000E22000-memory.dmp

                                      Filesize

                                      10.1MB

                                    • memory/2216-178-0x0000000003BD0000-0x0000000003BD1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4368-164-0x0000000000400000-0x00000000004BA000-memory.dmp

                                      Filesize

                                      744KB

                                    • memory/4368-10-0x0000000000660000-0x0000000000661000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4368-171-0x0000000000660000-0x0000000000661000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4368-173-0x0000000000400000-0x00000000004BA000-memory.dmp

                                      Filesize

                                      744KB

                                    • memory/4388-163-0x0000000000400000-0x0000000000415000-memory.dmp

                                      Filesize

                                      84KB

                                    • memory/4388-2-0x0000000000400000-0x0000000000415000-memory.dmp

                                      Filesize

                                      84KB

                                    • memory/4388-0-0x0000000000400000-0x0000000000415000-memory.dmp

                                      Filesize

                                      84KB