Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 21:39
Static task
static1
Behavioral task
behavioral1
Sample
3df52111a92eade10665d0b49d8dd0cb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3df52111a92eade10665d0b49d8dd0cb.exe
Resource
win10v2004-20231222-en
General
-
Target
3df52111a92eade10665d0b49d8dd0cb.exe
-
Size
679KB
-
MD5
3df52111a92eade10665d0b49d8dd0cb
-
SHA1
a3b1ed26ff3a6854263ff5afe8408a680643b8c0
-
SHA256
3a3ac3cbc41c952afa90d31d5109a4565292d3b51c929aff9fd0fdb851a0d025
-
SHA512
493ef51098a57457c2f2441ec8c32a89927359d4988d64c3d5ca568544c760cee1c359eca827a2c5c9da1fb2dc681773fbe6549e05d212f3fd058f6ad3f543e5
-
SSDEEP
6144:RJ82asJfnlAJwT71w+DtmVlTWw8oY4JHfTcE6sTNrCMHJeTBh+:ROWJ8wT7SoScCY4JHLcElTNm8eT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1676 svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 2352 3df52111a92eade10665d0b49d8dd0cb.exe 2128 WerFault.exe 2128 WerFault.exe 2128 WerFault.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\YYvxXfC\AVhrDus.dll svchost.exe File created C:\Windows\YYvxXfC\NjDasdF.dll svchost.exe File created C:\Windows\rtPGljO.dll 3df52111a92eade10665d0b49d8dd0cb.exe File created C:\Windows\voWOKO.dll svchost.exe File created C:\Windows\QwWVkGF\NCMbOMu.dll svchost.exe File opened for modification C:\Windows\QwWVkGF\NCMbOMu.dll svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2128 1676 WerFault.exe 16 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1676 2352 3df52111a92eade10665d0b49d8dd0cb.exe 16 PID 2352 wrote to memory of 1676 2352 3df52111a92eade10665d0b49d8dd0cb.exe 16 PID 2352 wrote to memory of 1676 2352 3df52111a92eade10665d0b49d8dd0cb.exe 16 PID 2352 wrote to memory of 1676 2352 3df52111a92eade10665d0b49d8dd0cb.exe 16 PID 1676 wrote to memory of 2128 1676 svchost.exe 31 PID 1676 wrote to memory of 2128 1676 svchost.exe 31 PID 1676 wrote to memory of 2128 1676 svchost.exe 31 PID 1676 wrote to memory of 2128 1676 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3df52111a92eade10665d0b49d8dd0cb.exe"C:\Users\Admin\AppData\Local\Temp\3df52111a92eade10665d0b49d8dd0cb.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\sigOqPTS\svchost.exe"C:\Users\Admin\AppData\Local\Temp\sigOqPTS\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1676 -s 6483⤵
- Loads dropped DLL
- Program crash
PID:2128
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
681KB
MD593ceae1b1d26056403c429f266756548
SHA104d7550ef937851eb216804ed3c789fdbacc0fdb
SHA256caddc79eff4525e05b187b3565d32d5bb1c8d3800c00f3ffd6a11c0728f3f73e
SHA512a13e37b9b5a08e179241aac8d634b5c538ceafd7e9da6a15f4044e5c84355471f105776a447177a264600f01d962ddad0596f5db391dee1cbd9791ef0d0028d9