Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 20:20
Static task
static1
Behavioral task
behavioral1
Sample
107954e1ff835f9a31268b164fad01b3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
107954e1ff835f9a31268b164fad01b3.exe
Resource
win10v2004-20231215-en
General
-
Target
107954e1ff835f9a31268b164fad01b3.exe
-
Size
756KB
-
MD5
107954e1ff835f9a31268b164fad01b3
-
SHA1
e9bd85e89cc1f1e6ee4b887612b9c7efdb573b4a
-
SHA256
71fe42bea55c3703ce4e30aa0b17568fdf959061b060a164b095296cf1666ec1
-
SHA512
2cd54c34814b5af4cc017c707334f75a189dc6f54704f24dfade8d3908c654acbcb55f04fc4ef409bd34f15e1031f731f2369a7a1fe7b1dc6423434fe432b4b8
-
SSDEEP
12288:sQlkgu2kPOI2xj/u2JT5x2Ha8WmQE1qFodzBQJuesvAX97BYIw:8WkPOI2x//zYHa8WmQEQyoErINBYI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3344 svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3440 3344 WerFault.exe 97 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2724 107954e1ff835f9a31268b164fad01b3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2724 wrote to memory of 3344 2724 107954e1ff835f9a31268b164fad01b3.exe 97 PID 2724 wrote to memory of 3344 2724 107954e1ff835f9a31268b164fad01b3.exe 97 PID 2724 wrote to memory of 3344 2724 107954e1ff835f9a31268b164fad01b3.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\107954e1ff835f9a31268b164fad01b3.exe"C:\Users\Admin\AppData\Local\Temp\107954e1ff835f9a31268b164fad01b3.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
PID:3344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 7603⤵
- Program crash
PID:3440
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 3344 -ip 33441⤵PID:2440
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD51fa78686c370bb7a2625a9c285ea0e2f
SHA174ac9e772d6933672b87c7e84da0b79e6397335c
SHA25694d387aea02283a804b3d4b844f06bc6af75b79a5af8bdf2ff2e0002595ff313
SHA512f00bf93c2a3b9a306fe53513dfc296e2cb64052888d8209d5e14701259fdce4927e6c73fe54e86b2a709420adb3f428d5320ca770b95dadb194de49fc808eb99