Analysis
-
max time kernel
2s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 12:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6e2c4460bb998f4afe45f7154983bd3c.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
6e2c4460bb998f4afe45f7154983bd3c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
6e2c4460bb998f4afe45f7154983bd3c.exe
-
Size
588KB
-
MD5
6e2c4460bb998f4afe45f7154983bd3c
-
SHA1
7412cc393cbff93db83fdd0c5ad4ef5e9207dcfa
-
SHA256
e25a57a751f18e3f105a0e881669a6e37b6fca806bb26b95048aa2f5233c766c
-
SHA512
3ddd03bd71f9bfa76021c808267625f7336b22dcc9fd5161a5e6c7a591027bc9d85f50a55684558a9c60adf8ed7482188806899755721335bf7c6564e237d7bc
-
SSDEEP
12288:MHkdd5Yz7LNaiR4aSmfFGeUNTY9uDyxgt//JDVYk+8/3cHVbLqv0f:Zdd50f4ZmfFGuVgt//X+s3wtE0
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2004 T011.exe -
Loads dropped DLL 6 IoCs
pid Process 2436 cmd.exe 2436 cmd.exe 2004 T011.exe 2004 T011.exe 2872 WerFault.exe 2872 WerFault.exe -
resource yara_rule behavioral1/memory/2004-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2436-6-0x0000000000180000-0x000000000018B000-memory.dmp upx behavioral1/files/0x000d0000000122c5-4.dat upx behavioral1/memory/2004-42-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 2872 2004 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2980 7zFM.exe Token: 35 2980 7zFM.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2088 2376 6e2c4460bb998f4afe45f7154983bd3c.exe 18 PID 2376 wrote to memory of 2088 2376 6e2c4460bb998f4afe45f7154983bd3c.exe 18 PID 2376 wrote to memory of 2088 2376 6e2c4460bb998f4afe45f7154983bd3c.exe 18 PID 2376 wrote to memory of 2088 2376 6e2c4460bb998f4afe45f7154983bd3c.exe 18 PID 2376 wrote to memory of 2088 2376 6e2c4460bb998f4afe45f7154983bd3c.exe 18 PID 2376 wrote to memory of 2088 2376 6e2c4460bb998f4afe45f7154983bd3c.exe 18 PID 2376 wrote to memory of 2088 2376 6e2c4460bb998f4afe45f7154983bd3c.exe 18 PID 2376 wrote to memory of 2436 2376 6e2c4460bb998f4afe45f7154983bd3c.exe 24 PID 2376 wrote to memory of 2436 2376 6e2c4460bb998f4afe45f7154983bd3c.exe 24 PID 2376 wrote to memory of 2436 2376 6e2c4460bb998f4afe45f7154983bd3c.exe 24 PID 2376 wrote to memory of 2436 2376 6e2c4460bb998f4afe45f7154983bd3c.exe 24 PID 2376 wrote to memory of 2436 2376 6e2c4460bb998f4afe45f7154983bd3c.exe 24 PID 2376 wrote to memory of 2436 2376 6e2c4460bb998f4afe45f7154983bd3c.exe 24 PID 2376 wrote to memory of 2436 2376 6e2c4460bb998f4afe45f7154983bd3c.exe 24 PID 2436 wrote to memory of 2004 2436 cmd.exe 22 PID 2436 wrote to memory of 2004 2436 cmd.exe 22 PID 2436 wrote to memory of 2004 2436 cmd.exe 22 PID 2436 wrote to memory of 2004 2436 cmd.exe 22 PID 2436 wrote to memory of 2004 2436 cmd.exe 22 PID 2436 wrote to memory of 2004 2436 cmd.exe 22 PID 2436 wrote to memory of 2004 2436 cmd.exe 22 PID 2004 wrote to memory of 2872 2004 T011.exe 20 PID 2004 wrote to memory of 2872 2004 T011.exe 20 PID 2004 wrote to memory of 2872 2004 T011.exe 20 PID 2004 wrote to memory of 2872 2004 T011.exe 20 PID 2004 wrote to memory of 2872 2004 T011.exe 20 PID 2004 wrote to memory of 2872 2004 T011.exe 20 PID 2004 wrote to memory of 2872 2004 T011.exe 20 PID 2088 wrote to memory of 2980 2088 cmd.exe 21 PID 2088 wrote to memory of 2980 2088 cmd.exe 21 PID 2088 wrote to memory of 2980 2088 cmd.exe 21 PID 2088 wrote to memory of 2980 2088 cmd.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e2c4460bb998f4afe45f7154983bd3c.exe"C:\Users\Admin\AppData\Local\Temp\6e2c4460bb998f4afe45f7154983bd3c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\\Game.rar"2⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Game.rar"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\\T011.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 2561⤵
- Loads dropped DLL
- Program crash
PID:2872
-
C:\Users\Admin\AppData\Local\Temp\T011.exeC:\Users\Admin\AppData\Local\Temp\\T011.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004