Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
48585673bc326c4e4e5bcf11cec16a54.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
48585673bc326c4e4e5bcf11cec16a54.exe
Resource
win10v2004-20231222-en
General
-
Target
48585673bc326c4e4e5bcf11cec16a54.exe
-
Size
2.9MB
-
MD5
48585673bc326c4e4e5bcf11cec16a54
-
SHA1
2478bbf870c21568d3cf5348dab7a4ef46b31d99
-
SHA256
0aff7bffd67ee87b6505d2cb5fcec2b65a797a8eadcf6820558e55f6ee00708d
-
SHA512
ef2279dcf9c1c4988d590128e9b9b5730d06ea6f47bf258e6c256c1a337b62d25b133a6f95343731005d8c848309c13fc61bce404e43c3b4588970d4e61f41cf
-
SSDEEP
49152:A8Jie4sELb9UHgckhzU3oYD7rn1f3L2iPNJZkjVxYleAQ6xcs7+JuzE8IOkV59la:A8iLEMU3oYl3L2iPNrkjEleAewuaula
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2856 server.exe 2568 ¸´¼þ 3-2HOMEÏ¡·¹.exe -
Loads dropped DLL 7 IoCs
pid Process 2996 48585673bc326c4e4e5bcf11cec16a54.exe 2996 48585673bc326c4e4e5bcf11cec16a54.exe 2996 48585673bc326c4e4e5bcf11cec16a54.exe 1992 WerFault.exe 1992 WerFault.exe 2996 48585673bc326c4e4e5bcf11cec16a54.exe 1992 WerFault.exe -
resource yara_rule behavioral1/files/0x000b000000015c67-12.dat upx behavioral1/files/0x000b000000015c67-22.dat upx behavioral1/files/0x000b000000015c67-18.dat upx behavioral1/memory/2568-23-0x0000000000400000-0x000000000084A000-memory.dmp upx behavioral1/files/0x000b000000015c67-16.dat upx behavioral1/memory/2568-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-61-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-91-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-89-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-87-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-85-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-83-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-81-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-79-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-77-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-75-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-73-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2568-100-0x0000000000400000-0x000000000084A000-memory.dmp upx behavioral1/memory/2568-101-0x0000000000400000-0x000000000084A000-memory.dmp upx behavioral1/memory/2568-102-0x0000000000400000-0x000000000084A000-memory.dmp upx behavioral1/memory/2568-103-0x0000000000400000-0x000000000084A000-memory.dmp upx behavioral1/memory/2568-104-0x0000000000400000-0x000000000084A000-memory.dmp upx behavioral1/memory/2568-105-0x0000000000400000-0x000000000084A000-memory.dmp upx behavioral1/memory/2568-106-0x0000000000400000-0x000000000084A000-memory.dmp upx behavioral1/memory/2568-107-0x0000000000400000-0x000000000084A000-memory.dmp upx behavioral1/memory/2568-108-0x0000000000400000-0x000000000084A000-memory.dmp upx behavioral1/memory/2568-109-0x0000000000400000-0x000000000084A000-memory.dmp upx behavioral1/memory/2568-110-0x0000000000400000-0x000000000084A000-memory.dmp upx behavioral1/memory/2568-111-0x0000000000400000-0x000000000084A000-memory.dmp upx behavioral1/memory/2568-112-0x0000000000400000-0x000000000084A000-memory.dmp upx behavioral1/memory/2568-113-0x0000000000400000-0x000000000084A000-memory.dmp upx behavioral1/memory/2568-114-0x0000000000400000-0x000000000084A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1992 2856 WerFault.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main ¸´¼þ 3-2HOMEÏ¡·¹.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2568 ¸´¼þ 3-2HOMEÏ¡·¹.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2568 ¸´¼þ 3-2HOMEÏ¡·¹.exe 2568 ¸´¼þ 3-2HOMEÏ¡·¹.exe 2568 ¸´¼þ 3-2HOMEÏ¡·¹.exe 2568 ¸´¼þ 3-2HOMEÏ¡·¹.exe 2568 ¸´¼þ 3-2HOMEÏ¡·¹.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2856 2996 48585673bc326c4e4e5bcf11cec16a54.exe 28 PID 2996 wrote to memory of 2856 2996 48585673bc326c4e4e5bcf11cec16a54.exe 28 PID 2996 wrote to memory of 2856 2996 48585673bc326c4e4e5bcf11cec16a54.exe 28 PID 2996 wrote to memory of 2856 2996 48585673bc326c4e4e5bcf11cec16a54.exe 28 PID 2856 wrote to memory of 1992 2856 server.exe 29 PID 2856 wrote to memory of 1992 2856 server.exe 29 PID 2856 wrote to memory of 1992 2856 server.exe 29 PID 2856 wrote to memory of 1992 2856 server.exe 29 PID 2996 wrote to memory of 2568 2996 48585673bc326c4e4e5bcf11cec16a54.exe 30 PID 2996 wrote to memory of 2568 2996 48585673bc326c4e4e5bcf11cec16a54.exe 30 PID 2996 wrote to memory of 2568 2996 48585673bc326c4e4e5bcf11cec16a54.exe 30 PID 2996 wrote to memory of 2568 2996 48585673bc326c4e4e5bcf11cec16a54.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\48585673bc326c4e4e5bcf11cec16a54.exe"C:\Users\Admin\AppData\Local\Temp\48585673bc326c4e4e5bcf11cec16a54.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 363⤵
- Loads dropped DLL
- Program crash
PID:1992
-
-
-
C:\Users\Admin\AppData\Local\Temp\¸´¼þ 3-2HOMEÏ¡·¹.exe"C:\Users\Admin\AppData\Local\Temp\¸´¼þ 3-2HOMEÏ¡·¹.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193KB
MD57d28dbe2f2cb64a5b9920eb21ce65dfd
SHA1ef4420af0d83f70995d8930bbcadcb77f6bf1a9c
SHA25600c445b26e8b9cf94457b351c5e9d5e897d1060a1647123799ce5d31cafb89b1
SHA5129dc2559291176be85472de5e3a88519104fcea742d75b01b65f3da4f4aa2decfaf5ee244d45bf59d7e7f867f6ee16f22d7e8d9fb2425f7c02d8b8b0174f33b4c
-
Filesize
641KB
MD5e0b8043a81eb02354d3327cdf3854275
SHA16fc12dd8ae74d5ade1a7af3da7beac90e8b0f579
SHA2565fa1b1a9ab92b948abefe3a81f15fa88f7d37957a17d7a25a73ec35a84beafcc
SHA51208825f38460a9ffcbc9c9aaa02417dcefe10919992b3ebec43f50fee4be1ebba8fadf5a35c533fc42ed64e998a3896060560d8b975314a532a792921d4e3a4ea
-
Filesize
110B
MD57c8c531ff6a158742da186b1fad6e00e
SHA198d4551e0d6ac034838a17437640f3335edfaa86
SHA25600ddbc71282fdbf74b8a02cc75b2c3d66529fe7664c148cc0ca79576a883c501
SHA5121788173da6e9cf7e5421c02854ca9122d0825927f33fc64bafb76377ee80c0e1a8112c36ee40b1cbce86e121f864777e8ddf9aecd282f3cc82b70e12cc904805
-
Filesize
20KB
MD532bbcad8a5617af8ad36bf63223ff784
SHA13e6a4b384d81dc9f244675666a224e081a22bc66
SHA25686a919da6a9c3b3129c933e034cd67a418de208cbfe347942a1f565f12c4587f
SHA5123068c2e899ab4a3b423d942fc41743976fbe6034877f67ee5bcea14074ff5048e93e700fb703909772ee723949517b7296c12fe4712862ef9b0205d4c87bfc1d
-
Filesize
1.0MB
MD534083cfe1ee79d1f5c554727d380748a
SHA107d315cfcc25e3298a8991317a9aedd35028c0ba
SHA25613d80022227aed98fb931e013ff54f8eab012b1407bd5c3fa375d778b5aaab08
SHA512634f556553cfd4b3e749a8e0e2701870ca3d5027997697a19eb683f8dca627aad415d75086fe2cf24b88382e0462be03fb08722f6a6e22835bd87afc6f221d04
-
Filesize
1.2MB
MD526a6354350290240d94b349b36ed4ede
SHA1e570d9be660e4c51f52acb36a8d52ebf124cc1a6
SHA256065332faa978933175569e614639cc1193506244b98bbe756115cf9f4b5842fe
SHA5129ddd432ee426953440ec761a03e814650c5a3eda4f4056ace38e5cd418c10c1a57f74a85eb861f9a1ff6eed5e5014622c5ba5495d5cf4476c3db700a3fd97a39