Analysis
-
max time kernel
44s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 19:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
39c14cfe4c684e46e172a4e889c75289.exe
Resource
win7-20231215-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
39c14cfe4c684e46e172a4e889c75289.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
39c14cfe4c684e46e172a4e889c75289.exe
-
Size
150KB
-
MD5
39c14cfe4c684e46e172a4e889c75289
-
SHA1
57fe4fa2f27e419f1b6ec5a7a14b68e662c6e06f
-
SHA256
4f83c2b531553ddc2cb04630a5cca53555031bbc1a8da70187eaac8825843e41
-
SHA512
1bba05fbcdc0fca2508741a72bb826ab10df19751e1d0703a6fc63580f93f45117b841ad4ce76e029625245ce8b8ed1444902443f0fa299e47c0639ddbc0405e
-
SSDEEP
3072:/VhUTNt0TSmLGkhjKXFvIGk6H0ydpZTr5iSTNL9cEVz3CiODcRwZ5:dkt0TSZkhWVvI+UupZTr5iSVrLmcE
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2676 ind75AD.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2216 2676 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4120 39c14cfe4c684e46e172a4e889c75289.exe 4120 39c14cfe4c684e46e172a4e889c75289.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4120 wrote to memory of 2676 4120 39c14cfe4c684e46e172a4e889c75289.exe 93 PID 4120 wrote to memory of 2676 4120 39c14cfe4c684e46e172a4e889c75289.exe 93 PID 4120 wrote to memory of 2676 4120 39c14cfe4c684e46e172a4e889c75289.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\39c14cfe4c684e46e172a4e889c75289.exe"C:\Users\Admin\AppData\Local\Temp\39c14cfe4c684e46e172a4e889c75289.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\ind75AD.tmpC:\Users\Admin\AppData\Local\Temp\ind75AD.tmp2⤵
- Executes dropped EXE
PID:2676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 2563⤵
- Program crash
PID:2216
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\INSE35~1.INI /quiet2⤵PID:1808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "2⤵PID:460
-
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"3⤵PID:5096
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\39C14C~1.EXE > nul2⤵PID:2924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "2⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\inl1395.tmpC:\Users\Admin\AppData\Local\Temp\inl1395.tmp cdf1912.tmp3⤵PID:3088
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl1395.tmp > nul4⤵PID:2956
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2676 -ip 26761⤵PID:4512
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:2028
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9D3B5132439B5C417F59E7B67E0C88292⤵PID:2960
-