Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231201-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231201-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2023 02:01

General

  • Target

    3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe

  • Size

    587KB

  • MD5

    62bcb2a5e85045733c1317675ede5529

  • SHA1

    07f5e3a4d0ae03182b7553d1bb5af738624745d7

  • SHA256

    3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb

  • SHA512

    25904446bfa10fb0c5194250d71c86a6045f5ed1f3882d224b1933644d8e09ddbaec773fb890c298edb527c778ec7f538d021691475dfae6b0b0846eaf43329f

  • SSDEEP

    12288:GxPgUrdBpK8vNhdyzpeG6MqgsrUWaCX0uvSGF:Ov/vNhMqd/Sk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe
    "C:\Users\Admin\AppData\Local\Temp\3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\AppData\Local\Temp\wuunph.exe
      "C:\Users\Admin\AppData\Local\Temp\wuunph.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4876
      • C:\Users\Admin\AppData\Local\Temp\wuunph.exe
        "C:\Users\Admin\AppData\Local\Temp\wuunph.exe"
        3⤵
          PID:3092
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 604
          3⤵
          • Program crash
          PID:4968
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4876 -ip 4876
      1⤵
        PID:3744

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\eopgkekszvm.d

        Filesize

        333KB

        MD5

        877bf4e9e89867a4575ab7902cfa9a49

        SHA1

        df44806b67a3f53082830984b943af6d2018534c

        SHA256

        c5c321357cb57e62b31bfadd7af993e70e6d703cda9bbdc51d1f83d94f918449

        SHA512

        a3929847a5a162d86135313f694778ec6b6702c884364c8cfa08759b435d31423a9b54ff3d091ba5f1eb3995f79d506f29f6b0fd6c26478a8f7339659d130d1c

      • C:\Users\Admin\AppData\Local\Temp\wuunph.exe

        Filesize

        165KB

        MD5

        3719215e4a123684f9279e9ecb819271

        SHA1

        b7ce71263a7d0cabc0a75dde908fdb61415be786

        SHA256

        47dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21

        SHA512

        119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf

      • C:\Users\Admin\AppData\Local\Temp\wuunph.exe

        Filesize

        165KB

        MD5

        3719215e4a123684f9279e9ecb819271

        SHA1

        b7ce71263a7d0cabc0a75dde908fdb61415be786

        SHA256

        47dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21

        SHA512

        119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf

      • memory/4876-5-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB