Analysis
-
max time kernel
5s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 19:24
Behavioral task
behavioral1
Sample
37b062ce7bf939ed689a1e5843835956.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
37b062ce7bf939ed689a1e5843835956.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
37b062ce7bf939ed689a1e5843835956.exe
-
Size
244KB
-
MD5
37b062ce7bf939ed689a1e5843835956
-
SHA1
e9a8d2afe7de6110d40ac7db106e7f4b9a9668bb
-
SHA256
eafbc21527f520eab55dcd1098488d28f95837878eda1de2a05aa6c7df32bf5f
-
SHA512
5fee478e1c402b0221d53ae1116de3ccec513db6c898d4346a0d559da229a22e7394c7a1975acd4bcfeedbb744247d3efefbc8b9b8a0d15f41d917683bed48b2
-
SSDEEP
6144:8b60dSBf8QajamgYXvl4KKoDrlTobaPSQYruLBe/EcbbOYF:8b60ds2BXeToDr60qi+tbO
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3444 Oxojya.exe -
resource yara_rule behavioral2/memory/3372-0-0x0000000000400000-0x000000000049C000-memory.dmp upx -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 37b062ce7bf939ed689a1e5843835956.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 37b062ce7bf939ed689a1e5843835956.exe File created C:\Windows\Oxojya.exe 37b062ce7bf939ed689a1e5843835956.exe File opened for modification C:\Windows\Oxojya.exe 37b062ce7bf939ed689a1e5843835956.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 316 3444 WerFault.exe 91 -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3372 37b062ce7bf939ed689a1e5843835956.exe 3444 Oxojya.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3372 wrote to memory of 3444 3372 37b062ce7bf939ed689a1e5843835956.exe 91 PID 3372 wrote to memory of 3444 3372 37b062ce7bf939ed689a1e5843835956.exe 91 PID 3372 wrote to memory of 3444 3372 37b062ce7bf939ed689a1e5843835956.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\37b062ce7bf939ed689a1e5843835956.exe"C:\Users\Admin\AppData\Local\Temp\37b062ce7bf939ed689a1e5843835956.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\Oxojya.exeC:\Windows\Oxojya.exe2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:3444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 5683⤵
- Program crash
PID:316
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3444 -ip 34441⤵PID:4904