Analysis

  • max time kernel
    92s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231201-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231201-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2023 01:12

General

  • Target

    27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe

  • Size

    422KB

  • MD5

    50541c2cd38eed9db2a65faa10fdc877

  • SHA1

    432affdf4626871c032cdb0d0432c9c91897df5b

  • SHA256

    27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7

  • SHA512

    e8ece503b2e96f314b9e480396a93cc3e6af2141488ed92e8bd76c75d6b3a5263ae57b28a09f87847aef238538c0b532eed833d1fdd0dc974cf7fdb6c408d96d

  • SSDEEP

    6144:P8LxBgQA9EWGEbktNxLahPW9DOzyAoXYwNF6dGtGW62WYFbNAKw6kOMw:gAVfbMNx+ZhyAoXNievWmvrMw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe
    "C:\Users\Admin\AppData\Local\Temp\27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4832
    • C:\Users\Admin\AppData\Local\Temp\uzqlnsntz.exe
      "C:\Users\Admin\AppData\Local\Temp\uzqlnsntz.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4120
      • C:\Users\Admin\AppData\Local\Temp\uzqlnsntz.exe
        "C:\Users\Admin\AppData\Local\Temp\uzqlnsntz.exe"
        3⤵
          PID:380
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 536
          3⤵
          • Program crash
          PID:1536
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4120 -ip 4120
      1⤵
        PID:4784

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\putvzfwr.d

        Filesize

        333KB

        MD5

        ebc1fae6e8f6d444d9680e694db83f04

        SHA1

        94b0aa53a92eb358ac7ae597b8a505c334af5cd3

        SHA256

        1338136538526c0d93b51a6085e1dba6a741c32c6cf4322c48f6d78ff5dcfb6a

        SHA512

        64c8b17241d76d0ee81da3c77b4f04f1af28be31426b14140824957834f047c90dba4fd5d287b1d467eaab7ad2e3655ffce4ef1fa8562e6f2f6c5dfe62882c6b

      • C:\Users\Admin\AppData\Local\Temp\uzqlnsntz.exe

        Filesize

        174KB

        MD5

        414ba01a5a8be61ea11f33c49f249a96

        SHA1

        feddcbee54dfad2b95726322814f3abf0015285a

        SHA256

        3b5fdd55bb5f0beaeb6343735cb4a17f7c0ad994c78b0ed07de21c20a2debfcd

        SHA512

        f599bd6edb94bf7b6b0bcb94660bc382b857834757303c9afc80bd61bbaa06ff71c586a90e5357a29d29c38b3c932710d4c9afb6b686485783e34480f228e454

      • C:\Users\Admin\AppData\Local\Temp\uzqlnsntz.exe

        Filesize

        174KB

        MD5

        414ba01a5a8be61ea11f33c49f249a96

        SHA1

        feddcbee54dfad2b95726322814f3abf0015285a

        SHA256

        3b5fdd55bb5f0beaeb6343735cb4a17f7c0ad994c78b0ed07de21c20a2debfcd

        SHA512

        f599bd6edb94bf7b6b0bcb94660bc382b857834757303c9afc80bd61bbaa06ff71c586a90e5357a29d29c38b3c932710d4c9afb6b686485783e34480f228e454

      • memory/4120-5-0x0000000000400000-0x0000000000431000-memory.dmp

        Filesize

        196KB