Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231201-en -
resource tags
arch:x64arch:x86image:win10v2004-20231201-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2023 01:12
Static task
static1
Behavioral task
behavioral1
Sample
27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe
Resource
win10v2004-20231201-en
General
-
Target
27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe
-
Size
422KB
-
MD5
50541c2cd38eed9db2a65faa10fdc877
-
SHA1
432affdf4626871c032cdb0d0432c9c91897df5b
-
SHA256
27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7
-
SHA512
e8ece503b2e96f314b9e480396a93cc3e6af2141488ed92e8bd76c75d6b3a5263ae57b28a09f87847aef238538c0b532eed833d1fdd0dc974cf7fdb6c408d96d
-
SSDEEP
6144:P8LxBgQA9EWGEbktNxLahPW9DOzyAoXYwNF6dGtGW62WYFbNAKw6kOMw:gAVfbMNx+ZhyAoXNievWmvrMw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
uzqlnsntz.exepid process 4120 uzqlnsntz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1536 4120 WerFault.exe uzqlnsntz.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exeuzqlnsntz.exedescription pid process target process PID 4832 wrote to memory of 4120 4832 27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe uzqlnsntz.exe PID 4832 wrote to memory of 4120 4832 27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe uzqlnsntz.exe PID 4832 wrote to memory of 4120 4832 27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe uzqlnsntz.exe PID 4120 wrote to memory of 380 4120 uzqlnsntz.exe uzqlnsntz.exe PID 4120 wrote to memory of 380 4120 uzqlnsntz.exe uzqlnsntz.exe PID 4120 wrote to memory of 380 4120 uzqlnsntz.exe uzqlnsntz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe"C:\Users\Admin\AppData\Local\Temp\27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\uzqlnsntz.exe"C:\Users\Admin\AppData\Local\Temp\uzqlnsntz.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\uzqlnsntz.exe"C:\Users\Admin\AppData\Local\Temp\uzqlnsntz.exe"3⤵PID:380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 5363⤵
- Program crash
PID:1536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4120 -ip 41201⤵PID:4784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
333KB
MD5ebc1fae6e8f6d444d9680e694db83f04
SHA194b0aa53a92eb358ac7ae597b8a505c334af5cd3
SHA2561338136538526c0d93b51a6085e1dba6a741c32c6cf4322c48f6d78ff5dcfb6a
SHA51264c8b17241d76d0ee81da3c77b4f04f1af28be31426b14140824957834f047c90dba4fd5d287b1d467eaab7ad2e3655ffce4ef1fa8562e6f2f6c5dfe62882c6b
-
Filesize
174KB
MD5414ba01a5a8be61ea11f33c49f249a96
SHA1feddcbee54dfad2b95726322814f3abf0015285a
SHA2563b5fdd55bb5f0beaeb6343735cb4a17f7c0ad994c78b0ed07de21c20a2debfcd
SHA512f599bd6edb94bf7b6b0bcb94660bc382b857834757303c9afc80bd61bbaa06ff71c586a90e5357a29d29c38b3c932710d4c9afb6b686485783e34480f228e454
-
Filesize
174KB
MD5414ba01a5a8be61ea11f33c49f249a96
SHA1feddcbee54dfad2b95726322814f3abf0015285a
SHA2563b5fdd55bb5f0beaeb6343735cb4a17f7c0ad994c78b0ed07de21c20a2debfcd
SHA512f599bd6edb94bf7b6b0bcb94660bc382b857834757303c9afc80bd61bbaa06ff71c586a90e5357a29d29c38b3c932710d4c9afb6b686485783e34480f228e454