Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231201-en -
resource tags
arch:x64arch:x86image:win10v2004-20231201-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2023 02:01
Static task
static1
Behavioral task
behavioral1
Sample
3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe
Resource
win10v2004-20231201-en
General
-
Target
3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe
-
Size
587KB
-
MD5
62bcb2a5e85045733c1317675ede5529
-
SHA1
07f5e3a4d0ae03182b7553d1bb5af738624745d7
-
SHA256
3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb
-
SHA512
25904446bfa10fb0c5194250d71c86a6045f5ed1f3882d224b1933644d8e09ddbaec773fb890c298edb527c778ec7f538d021691475dfae6b0b0846eaf43329f
-
SSDEEP
12288:GxPgUrdBpK8vNhdyzpeG6MqgsrUWaCX0uvSGF:Ov/vNhMqd/Sk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4876 wuunph.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4968 4876 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1544 wrote to memory of 4876 1544 3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe 86 PID 1544 wrote to memory of 4876 1544 3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe 86 PID 1544 wrote to memory of 4876 1544 3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe 86 PID 4876 wrote to memory of 3092 4876 wuunph.exe 88 PID 4876 wrote to memory of 3092 4876 wuunph.exe 88 PID 4876 wrote to memory of 3092 4876 wuunph.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe"C:\Users\Admin\AppData\Local\Temp\3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\wuunph.exe"C:\Users\Admin\AppData\Local\Temp\wuunph.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\wuunph.exe"C:\Users\Admin\AppData\Local\Temp\wuunph.exe"3⤵PID:3092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 6043⤵
- Program crash
PID:4968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4876 -ip 48761⤵PID:3744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
333KB
MD5877bf4e9e89867a4575ab7902cfa9a49
SHA1df44806b67a3f53082830984b943af6d2018534c
SHA256c5c321357cb57e62b31bfadd7af993e70e6d703cda9bbdc51d1f83d94f918449
SHA512a3929847a5a162d86135313f694778ec6b6702c884364c8cfa08759b435d31423a9b54ff3d091ba5f1eb3995f79d506f29f6b0fd6c26478a8f7339659d130d1c
-
Filesize
165KB
MD53719215e4a123684f9279e9ecb819271
SHA1b7ce71263a7d0cabc0a75dde908fdb61415be786
SHA25647dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21
SHA512119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf
-
Filesize
165KB
MD53719215e4a123684f9279e9ecb819271
SHA1b7ce71263a7d0cabc0a75dde908fdb61415be786
SHA25647dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21
SHA512119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf