Analysis
-
max time kernel
154s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 04:31
Behavioral task
behavioral1
Sample
5462051b36b09b653e2933d2c0223d01.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5462051b36b09b653e2933d2c0223d01.exe
Resource
win10v2004-20231215-en
General
-
Target
5462051b36b09b653e2933d2c0223d01.exe
-
Size
295KB
-
MD5
5462051b36b09b653e2933d2c0223d01
-
SHA1
ade00ae20fd3a9568127a0bd1269fe4eb4a597ff
-
SHA256
cf2c46a808a624a013375822d0b8125d131cf00e6edfd4ab36883457cea44141
-
SHA512
b6a680203ac72a96a47ae9e4e2e5ebff212e43530d9dd8f353496849573fc3f8d265acc77676ab5f98f7183a8aa9c00e0442ffc4bfb36d7a7cc2156bc473a457
-
SSDEEP
6144:Ccr3o6DxHg45rb2gmFVUHJ99Ol/0Pq67YO6Y6w+m+CI1fe25JoS:Ccr7xHNb2gV7Akq674Y61m+Cwfe25JoS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4508 neter.exe -
resource yara_rule behavioral2/memory/5048-0-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000600000002324c-4.dat upx behavioral2/memory/4508-5-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4316-9-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/5048-10-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4508-12-0x0000000000400000-0x0000000000493000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4508 set thread context of 4316 4508 neter.exe 91 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\NetMeeting\neter.exe 5462051b36b09b653e2933d2c0223d01.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 456 4316 WerFault.exe 91 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4508 wrote to memory of 4316 4508 neter.exe 91 PID 4508 wrote to memory of 4316 4508 neter.exe 91 PID 4508 wrote to memory of 4316 4508 neter.exe 91 PID 4508 wrote to memory of 4316 4508 neter.exe 91 PID 4508 wrote to memory of 4316 4508 neter.exe 91 PID 5048 wrote to memory of 1308 5048 5462051b36b09b653e2933d2c0223d01.exe 93 PID 5048 wrote to memory of 1308 5048 5462051b36b09b653e2933d2c0223d01.exe 93 PID 5048 wrote to memory of 1308 5048 5462051b36b09b653e2933d2c0223d01.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\5462051b36b09b653e2933d2c0223d01.exe"C:\Users\Admin\AppData\Local\Temp\5462051b36b09b653e2933d2c0223d01.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\871050.bat2⤵PID:1308
-
-
C:\Program Files (x86)\NetMeeting\neter.exe"C:\Program Files (x86)\NetMeeting\neter.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe" 424082⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4316 -s 123⤵
- Program crash
PID:456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4316 -ip 43161⤵PID:4756
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
295KB
MD55462051b36b09b653e2933d2c0223d01
SHA1ade00ae20fd3a9568127a0bd1269fe4eb4a597ff
SHA256cf2c46a808a624a013375822d0b8125d131cf00e6edfd4ab36883457cea44141
SHA512b6a680203ac72a96a47ae9e4e2e5ebff212e43530d9dd8f353496849573fc3f8d265acc77676ab5f98f7183a8aa9c00e0442ffc4bfb36d7a7cc2156bc473a457
-
Filesize
190B
MD5960808eed1bb606157543fdaecc8c4cc
SHA1c313978984138441f82fe13ae27fafe547b5ac66
SHA2562a5256772b3ba9c77b44e0985eb1684bb6aa9d5274e24a58f16c26a6df6d98a3
SHA51210f4143a1c2d30d9b01602c8f893d0ef733b406f0adb4499533c6446a8c43b9783e02f96b1d9462815edaee4babcd895846aee45927399714390de3431786d05