Analysis
-
max time kernel
9s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
0ed77c64afc3414e94291a8c0f1a816f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0ed77c64afc3414e94291a8c0f1a816f.exe
Resource
win10v2004-20231215-en
General
-
Target
0ed77c64afc3414e94291a8c0f1a816f.exe
-
Size
827KB
-
MD5
0ed77c64afc3414e94291a8c0f1a816f
-
SHA1
2b359c72cb24b7daa28a1d30ff45d5f84ecfe53a
-
SHA256
54a50e0f177f7ac2753ee30ee39f5bab0146b556ec5593ef05c3a3f2371da3cf
-
SHA512
ca4384e3152ac4232baf4e4b7ce47d6efc90e34440e452643f411880dd7c3abfa2bc61f88ce79618e9859d509261d485baa885cb3abc1a20918eed95faeb1fbb
-
SSDEEP
12288:CPUB1kkNi3xVFB5stCEN+YtqGlJiGwHbqZZVPOJOy/hUHC7Fx1jbAtf0z75o9NWc:fEk0TFENbr22hC7/OHEx16k7cNW9sdP
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\R: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\Z: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\M: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\Q: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\G: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\H: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\I: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\L: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\S: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\T: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\W: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\Y: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\E: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\K: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\N: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\O: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\P: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\U: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\V: 0ed77c64afc3414e94291a8c0f1a816f.exe File opened (read-only) \??\X: 0ed77c64afc3414e94291a8c0f1a816f.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 0ed77c64afc3414e94291a8c0f1a816f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
pid pid_target Process procid_target 4964 4332 WerFault.exe 17 4512 4332 WerFault.exe 17 3316 4332 WerFault.exe 17 2892 4332 WerFault.exe 17 4732 4332 WerFault.exe 17 3780 4332 WerFault.exe 17 4620 4332 WerFault.exe 17 2296 4332 WerFault.exe 17 3284 4332 WerFault.exe 17 1140 4332 WerFault.exe 17 2456 4332 WerFault.exe 17 -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4332 0ed77c64afc3414e94291a8c0f1a816f.exe 4332 0ed77c64afc3414e94291a8c0f1a816f.exe 4332 0ed77c64afc3414e94291a8c0f1a816f.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4332 0ed77c64afc3414e94291a8c0f1a816f.exe 4332 0ed77c64afc3414e94291a8c0f1a816f.exe 4332 0ed77c64afc3414e94291a8c0f1a816f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4332 0ed77c64afc3414e94291a8c0f1a816f.exe 4332 0ed77c64afc3414e94291a8c0f1a816f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ed77c64afc3414e94291a8c0f1a816f.exe"C:\Users\Admin\AppData\Local\Temp\0ed77c64afc3414e94291a8c0f1a816f.exe"1⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 8042⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 8482⤵
- Program crash
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 12642⤵
- Program crash
PID:3316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 13122⤵
- Program crash
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 13042⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 13162⤵
- Program crash
PID:3780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 14282⤵
- Program crash
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 14282⤵
- Program crash
PID:2296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 14562⤵
- Program crash
PID:3284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 19202⤵
- Program crash
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 14322⤵
- Program crash
PID:2456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4332 -ip 43321⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4332 -ip 43321⤵PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4332 -ip 43321⤵PID:4424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4332 -ip 43321⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4332 -ip 43321⤵PID:3192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4332 -ip 43321⤵PID:3040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4332 -ip 43321⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4332 -ip 43321⤵PID:3324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4332 -ip 43321⤵PID:2592
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3384
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:2396
-
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4440
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1780
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3220
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:3088
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:4268
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:2268
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3796
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3908
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:1292
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3644
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:1376
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:1744
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:5096
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2352
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4332 -ip 43321⤵PID:1304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4332 -ip 43321⤵PID:4852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize471B
MD5332ef598635cd207d6e98ba95f0a8c69
SHA1249f117fb8dc3d4d5f223599f1ec7b5cefeb5c3c
SHA256b32068974dd4617e93225ea65351650f936bb970dc3e4ce6a0d5e66329596065
SHA512ab602279de96379d61800677eb12b6355730424d650565f2ef9c16366e4b0946d15c4a99118b1ca77d7587eb77fa692188d919d3c44f8a348abacf3aadf2e7a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize412B
MD56c4335710f70a71e6ef01d1f469cf33b
SHA109dca52c57e42fd7a791dff97e51a708a14b6e72
SHA256c524ac4023d88a8baa1cd2accf95eed3ee27b36eaa1b57e6a37f1e0408bd70f5
SHA512a827dad2dc0b7373e481ae34bf3accb6fe85d7138cf3e906f6069af8d26e16963de49d5cd0c939d684f795374ea64131d64d1c48c7f7fbf776b59323bc51cb66
-
Filesize
1022B
MD57fc198d8f3aa7ce6447c690b39d0d9d8
SHA1f6c3b595d2968ae775ceac43b4b35dc2a842c5ef
SHA256c6e3e4e36a763316be72bc914218fa2c7fd7f5df0e317bfab8fed9fe7879e67e
SHA51237aa583e19dc51ed21ca2137a2ce071783ccbcce55b2b95d813bf9b61b0c2b5fe179b1a95dd7b3a566d78f00bc7f8024e7ed2cd79a51160b166254d29bdce9fe
-
Filesize
6KB
MD5099ba37f81c044f6b2609537fdb7d872
SHA1470ef859afbce52c017874d77c1695b7b0f9cb87
SHA2568c98c856e4d43f705ff9a5c9a55f92e1885765654912b4c75385c3ea2fdef4a7
SHA512837e1ad7fe4f5cbc0a87f3703ba211c18f32b20df93b23f681cbd0390d8077adba64cf6454a1bb28df1f7df4cb2cdc021d826b6ef8db890e40f21d618d5eb07a