Analysis
-
max time kernel
125s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2023 02:29
Static task
static1
Behavioral task
behavioral1
Sample
1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe
Resource
win10v2004-20231130-en
General
-
Target
1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe
-
Size
363KB
-
MD5
6efb6ff87f5d89884d54bec7292175cf
-
SHA1
22059d226717ac0d3939856d0dfa96d227d4f2f7
-
SHA256
1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f
-
SHA512
81af67219a0d32e45988d406a9faef65bbfbc816514d80867c57855fa286ecbcb86c9c1cc8730dc2be46f8e9ebd044102adf54cc5fef2d30efc0536701bb623c
-
SSDEEP
6144:3BlL/MvvVjdK0lJ5YqTkc1pEMkvIMFRnsEBkWqFFs7SqEsZc6/e5jbXyAGAu:xavtpKQhwiuMkrfkP07zO6/eF+eu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
sxuojeerk.exepid process 2856 sxuojeerk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2540 2856 WerFault.exe sxuojeerk.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exesxuojeerk.exedescription pid process target process PID 2180 wrote to memory of 2856 2180 1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe sxuojeerk.exe PID 2180 wrote to memory of 2856 2180 1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe sxuojeerk.exe PID 2180 wrote to memory of 2856 2180 1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe sxuojeerk.exe PID 2856 wrote to memory of 3544 2856 sxuojeerk.exe sxuojeerk.exe PID 2856 wrote to memory of 3544 2856 sxuojeerk.exe sxuojeerk.exe PID 2856 wrote to memory of 3544 2856 sxuojeerk.exe sxuojeerk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe"C:\Users\Admin\AppData\Local\Temp\1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe"C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe"C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe"3⤵PID:3544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 6203⤵
- Program crash
PID:2540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 2856 -ip 28561⤵PID:116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
334KB
MD5e1856a3cb40a5605ad36b4ae37dfe37a
SHA1b0fa5b73764df7a6c79802ac954e28d31f9512d1
SHA256894a723c45dfff46803c4aff233cdad0b2494fbe5ee2249ddc3186e92bda3bea
SHA51267960b4c618df794ac020c9be089c0efc5c292b089dad36bc8e11faba72990d7239fee335485cc3ce6d16590639403275a0c3ca6e72c202033a8d1d0ed113996
-
Filesize
178KB
MD5ee5d6845f2d916386c0b653d46bc82d5
SHA1adcf833083c0aaff86644f43bd1f95fa1b48f6fb
SHA2565930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3
SHA5124c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a
-
Filesize
178KB
MD5ee5d6845f2d916386c0b653d46bc82d5
SHA1adcf833083c0aaff86644f43bd1f95fa1b48f6fb
SHA2565930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3
SHA5124c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a