Analysis

  • max time kernel
    125s
  • max time network
    49s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2023 02:29

General

  • Target

    1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe

  • Size

    363KB

  • MD5

    6efb6ff87f5d89884d54bec7292175cf

  • SHA1

    22059d226717ac0d3939856d0dfa96d227d4f2f7

  • SHA256

    1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f

  • SHA512

    81af67219a0d32e45988d406a9faef65bbfbc816514d80867c57855fa286ecbcb86c9c1cc8730dc2be46f8e9ebd044102adf54cc5fef2d30efc0536701bb623c

  • SSDEEP

    6144:3BlL/MvvVjdK0lJ5YqTkc1pEMkvIMFRnsEBkWqFFs7SqEsZc6/e5jbXyAGAu:xavtpKQhwiuMkrfkP07zO6/eF+eu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe
    "C:\Users\Admin\AppData\Local\Temp\1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe
      "C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2856
      • C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe
        "C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe"
        3⤵
          PID:3544
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 620
          3⤵
          • Program crash
          PID:2540
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 2856 -ip 2856
      1⤵
        PID:116

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\lxdadgl.hv

        Filesize

        334KB

        MD5

        e1856a3cb40a5605ad36b4ae37dfe37a

        SHA1

        b0fa5b73764df7a6c79802ac954e28d31f9512d1

        SHA256

        894a723c45dfff46803c4aff233cdad0b2494fbe5ee2249ddc3186e92bda3bea

        SHA512

        67960b4c618df794ac020c9be089c0efc5c292b089dad36bc8e11faba72990d7239fee335485cc3ce6d16590639403275a0c3ca6e72c202033a8d1d0ed113996

      • C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe

        Filesize

        178KB

        MD5

        ee5d6845f2d916386c0b653d46bc82d5

        SHA1

        adcf833083c0aaff86644f43bd1f95fa1b48f6fb

        SHA256

        5930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3

        SHA512

        4c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a

      • C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe

        Filesize

        178KB

        MD5

        ee5d6845f2d916386c0b653d46bc82d5

        SHA1

        adcf833083c0aaff86644f43bd1f95fa1b48f6fb

        SHA256

        5930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3

        SHA512

        4c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a

      • memory/2856-5-0x0000000001060000-0x0000000001062000-memory.dmp

        Filesize

        8KB