Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 22:14
Behavioral task
behavioral1
Sample
14f66dfb5db0867fb0f9c83ec8831de2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14f66dfb5db0867fb0f9c83ec8831de2.exe
Resource
win10v2004-20231215-en
General
-
Target
14f66dfb5db0867fb0f9c83ec8831de2.exe
-
Size
82KB
-
MD5
14f66dfb5db0867fb0f9c83ec8831de2
-
SHA1
16c580bbc25ce0e6275b23dde8fffb3b5badb7a0
-
SHA256
34b3e610cfb0c53df98ad9247a3a353fb2868b8d1743b53ecfc48362c60d6a81
-
SHA512
ba13d4e622df9f0f35207109e1a08c2cbf00a999107d70ee4db7ffa8c1fc453e9499e62226d1889518a506c2bc166daa55dff73f672410a1464d531df5296a4b
-
SSDEEP
192:7G8Isn7IZxW81qsXIfzdeL/jKfP1FA/sDM/oOu5EXdmtkEnxIT1WEyncjWOL2edD:73IsWW6qbYL0PnAkQnu5EXSniT1in8jR
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2560-0-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2560-7-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2284 2560 WerFault.exe 27 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main 14f66dfb5db0867fb0f9c83ec8831de2.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "about:blank" 14f66dfb5db0867fb0f9c83ec8831de2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2284 2560 14f66dfb5db0867fb0f9c83ec8831de2.exe 29 PID 2560 wrote to memory of 2284 2560 14f66dfb5db0867fb0f9c83ec8831de2.exe 29 PID 2560 wrote to memory of 2284 2560 14f66dfb5db0867fb0f9c83ec8831de2.exe 29 PID 2560 wrote to memory of 2284 2560 14f66dfb5db0867fb0f9c83ec8831de2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\14f66dfb5db0867fb0f9c83ec8831de2.exe"C:\Users\Admin\AppData\Local\Temp\14f66dfb5db0867fb0f9c83ec8831de2.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 4162⤵
- Program crash
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252B
MD5ad3ddb5089e3a61a2f9eaeb81f52e7ad
SHA14f2a82e3c3996cd6337d282c79196a1b0e904873
SHA256aa0b4ea98a7007f429d544d011dcff079a00118657c22cc95930fc0bfc943fdb
SHA5126129e7b1a631ab98935f5c6237740a04288b7799d98a827d8abb338a70f91f03893621570de9f2d4dc8d29d0ad5ed3bed01d29df8a58d5be0d683167ead5e747