Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 22:43

General

  • Target

    16a31790b2c58257ff87fb04968ad462.exe

  • Size

    572KB

  • MD5

    16a31790b2c58257ff87fb04968ad462

  • SHA1

    16e2991771c10b70c4d0d82d5d671df50a9c7941

  • SHA256

    71f8c47ae1110f4ebe7c2e7990cbe14eba60ddc45ca200df15123640daf5b5aa

  • SHA512

    0ad21b0b8303ffee71f90e0e261375c78d8f411dbac5fbdf691934386e02775ebee4f392f0edc58a76cc1d82f09177e34808b75ba7fe1f92b13a738ca64139d2

  • SSDEEP

    12288:U6B6cDd+OHfJh9ck/Ri4eef52lhIn4J8uijt5wHFZ4P+CId0uZPXLx4y4:U1cbfX975b/Lzh5MCCjx4y

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 412
    1⤵
    • Loads dropped DLL
    • Program crash
    PID:1060
  • C:\Windows\temp\PEST V3-2 needsbinding.exe
    "C:\Windows\temp\PEST V3-2 needsbinding.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2508
  • C:\Users\Admin\AppData\Local\Temp\16a31790b2c58257ff87fb04968ad462.exe
    "C:\Users\Admin\AppData\Local\Temp\16a31790b2c58257ff87fb04968ad462.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2496-16-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2508-18-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2508-24-0x0000000000400000-0x0000000000562000-memory.dmp

    Filesize

    1.4MB

  • memory/2508-26-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB