Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
10aee86ad8a663f7fafc691e2cea909c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10aee86ad8a663f7fafc691e2cea909c.exe
Resource
win10v2004-20231215-en
General
-
Target
10aee86ad8a663f7fafc691e2cea909c.exe
-
Size
200KB
-
MD5
10aee86ad8a663f7fafc691e2cea909c
-
SHA1
e75fd589b0a119e8acce0e3d6e7e0ec9fa287070
-
SHA256
52dca72d1a6873d71e3bce6144356ec6e1eac50d15260d7d16004dc953404f41
-
SHA512
10afafb49e337290dad282a0aa51e202cae609f2456ac3ff14061ec061f7f99a9fbdbf5e6984fbef3280e2fb71aab35848b2647b8a47dd08ac03e8d0c31242a1
-
SSDEEP
3072:Cd9xR3G2BZMbBLBaYw0coLujNHCd8pFhcb0pHugwjwVReyrB6kiiyKWyf4lHdFtz:Cd93ZBZMbqYgomHCdiF2UZRe5HjfV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2204 4.exe -
Loads dropped DLL 9 IoCs
pid Process 2172 10aee86ad8a663f7fafc691e2cea909c.exe 2172 10aee86ad8a663f7fafc691e2cea909c.exe 2204 4.exe 2204 4.exe 2204 4.exe 2088 WerFault.exe 2088 WerFault.exe 2088 WerFault.exe 2088 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2088 2204 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2204 2172 10aee86ad8a663f7fafc691e2cea909c.exe 28 PID 2172 wrote to memory of 2204 2172 10aee86ad8a663f7fafc691e2cea909c.exe 28 PID 2172 wrote to memory of 2204 2172 10aee86ad8a663f7fafc691e2cea909c.exe 28 PID 2172 wrote to memory of 2204 2172 10aee86ad8a663f7fafc691e2cea909c.exe 28 PID 2172 wrote to memory of 2204 2172 10aee86ad8a663f7fafc691e2cea909c.exe 28 PID 2172 wrote to memory of 2204 2172 10aee86ad8a663f7fafc691e2cea909c.exe 28 PID 2172 wrote to memory of 2204 2172 10aee86ad8a663f7fafc691e2cea909c.exe 28 PID 2204 wrote to memory of 2088 2204 4.exe 29 PID 2204 wrote to memory of 2088 2204 4.exe 29 PID 2204 wrote to memory of 2088 2204 4.exe 29 PID 2204 wrote to memory of 2088 2204 4.exe 29 PID 2204 wrote to memory of 2088 2204 4.exe 29 PID 2204 wrote to memory of 2088 2204 4.exe 29 PID 2204 wrote to memory of 2088 2204 4.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\10aee86ad8a663f7fafc691e2cea909c.exe"C:\Users\Admin\AppData\Local\Temp\10aee86ad8a663f7fafc691e2cea909c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 2563⤵
- Loads dropped DLL
- Program crash
PID:2088
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD537d18d0a07115dd5ba837344ce1ac0ab
SHA173d013014a723eedad2300b2c61704fb61223718
SHA256bb70a54bb432ee1bbb615b7d1bc3f446fe09c9344483c960fc9c817f0879201c
SHA512de460b1c9859df49853a986000155b7f6052617bdfb69b39b2a9c01c91e4f726f3856ac25c1baf9197d31cd804cf0581f23b51ab643d76b4fb402a09bc9e75df