Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 00:32
Behavioral task
behavioral1
Sample
46a96b032abc2cb00317a2f010d7be7e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46a96b032abc2cb00317a2f010d7be7e.exe
Resource
win10v2004-20231215-en
General
-
Target
46a96b032abc2cb00317a2f010d7be7e.exe
-
Size
212KB
-
MD5
46a96b032abc2cb00317a2f010d7be7e
-
SHA1
76b649cc7496cecc46bd8e7bf741f1999063605a
-
SHA256
36d8e2445d84d4f5285f1a7206efe441c882c81e8c0c483e6e14186ffe243ace
-
SHA512
951326d99888d7d35c7c9cd522cee2b88132b249f9fe8f3966a577ccd2664999735762a35a7f2afdcd228450289618162f4a2758a0bc8eb1ae311b62aba36171
-
SSDEEP
6144:+/CBSA9GtvcpTk82BhEgSC1cd5IMP3qP:dBLivcp6EtC1cdObP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3176 Yduxea.exe -
resource yara_rule behavioral2/memory/3404-0-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral2/memory/3404-2-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral2/files/0x0007000000023211-10.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Yduxea.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 46a96b032abc2cb00317a2f010d7be7e.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 46a96b032abc2cb00317a2f010d7be7e.exe File created C:\Windows\Yduxea.exe 46a96b032abc2cb00317a2f010d7be7e.exe File opened for modification C:\Windows\Yduxea.exe 46a96b032abc2cb00317a2f010d7be7e.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Yduxea.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2008 3176 WerFault.exe 91 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main Yduxea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe 3176 Yduxea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3404 wrote to memory of 3176 3404 46a96b032abc2cb00317a2f010d7be7e.exe 91 PID 3404 wrote to memory of 3176 3404 46a96b032abc2cb00317a2f010d7be7e.exe 91 PID 3404 wrote to memory of 3176 3404 46a96b032abc2cb00317a2f010d7be7e.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\46a96b032abc2cb00317a2f010d7be7e.exe"C:\Users\Admin\AppData\Local\Temp\46a96b032abc2cb00317a2f010d7be7e.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\Yduxea.exeC:\Windows\Yduxea.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:3176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 8083⤵
- Program crash
PID:2008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3176 -ip 31761⤵PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
362B
MD5d13e4fd15037e64c872bdbe1055d7f5d
SHA166cf256c5aaa533e3732f07ea4b359c826dfde21
SHA256d27edabc16ddb7c162b21ac76c0b9cefb79f648e528edc784767b6ef9b184889
SHA512979b547bfe981fec35fc43cf5eae91fc65c1dfb987fb6251010a484ade116528297992ba49962fde51783623138e1581308b67aff11aa569dfc64a03aadbd2f2
-
Filesize
212KB
MD546a96b032abc2cb00317a2f010d7be7e
SHA176b649cc7496cecc46bd8e7bf741f1999063605a
SHA25636d8e2445d84d4f5285f1a7206efe441c882c81e8c0c483e6e14186ffe243ace
SHA512951326d99888d7d35c7c9cd522cee2b88132b249f9fe8f3966a577ccd2664999735762a35a7f2afdcd228450289618162f4a2758a0bc8eb1ae311b62aba36171