Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
77e8c28a8fb53c3fe0ed78398b9b97e6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
77e8c28a8fb53c3fe0ed78398b9b97e6.exe
Resource
win10v2004-20231215-en
General
-
Target
77e8c28a8fb53c3fe0ed78398b9b97e6.exe
-
Size
630KB
-
MD5
77e8c28a8fb53c3fe0ed78398b9b97e6
-
SHA1
75b15ab27387a84895c51d2a13708961d3e414f6
-
SHA256
9f8f3e09babe3e95213b715373c8e0cee787d234577017d6f119d1278d27c14f
-
SHA512
1ffbc3f7e8e6558260f94da7ac9d2b857966dd21136f932713c35bbfda2c529bdcc72a8417f11ee28a3ece666a1ab0a0438212a648750878d49b1a4e5b982358
-
SSDEEP
12288:b5l7S0MrlsyR60X+EakXS+SWl0Ggkne2TZJ0l:b59olsqpbi+TqGm2TP0l
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3232 51Remote.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1664 1912 WerFault.exe 93 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3232 set thread context of 1912 3232 51Remote.exe 93 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\51Remote\51Remote.exe 77e8c28a8fb53c3fe0ed78398b9b97e6.exe File opened for modification C:\Program Files (x86)\51Remote\51Remote.exe 77e8c28a8fb53c3fe0ed78398b9b97e6.exe File opened for modification C:\Program Files (x86)\51Remote\51Remote.exe 51Remote.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 816 77e8c28a8fb53c3fe0ed78398b9b97e6.exe 816 77e8c28a8fb53c3fe0ed78398b9b97e6.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3232 wrote to memory of 1912 3232 51Remote.exe 93 PID 3232 wrote to memory of 1912 3232 51Remote.exe 93 PID 3232 wrote to memory of 1912 3232 51Remote.exe 93 PID 3232 wrote to memory of 1912 3232 51Remote.exe 93 PID 3232 wrote to memory of 1912 3232 51Remote.exe 93 PID 3232 wrote to memory of 1912 3232 51Remote.exe 93 PID 3232 wrote to memory of 1912 3232 51Remote.exe 93 PID 3232 wrote to memory of 1912 3232 51Remote.exe 93 PID 3232 wrote to memory of 1912 3232 51Remote.exe 93 PID 3232 wrote to memory of 1912 3232 51Remote.exe 93 PID 3232 wrote to memory of 1912 3232 51Remote.exe 93 PID 3232 wrote to memory of 1912 3232 51Remote.exe 93 PID 3232 wrote to memory of 1912 3232 51Remote.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\77e8c28a8fb53c3fe0ed78398b9b97e6.exe"C:\Users\Admin\AppData\Local\Temp\77e8c28a8fb53c3fe0ed78398b9b97e6.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:816
-
C:\Program Files (x86)\51Remote\51Remote.exe"C:\Program Files (x86)\51Remote\51Remote.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXEC:\Program Files (x86)\51Remote\51Remote.exe2⤵PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 123⤵
- Program crash
PID:1664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1912 -ip 19121⤵PID:264
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD583b956d4d7befe07ea9735d0f13c5f9a
SHA17581a5d63441f95a0edaec3e2a606e0abcf15702
SHA25646b362936c6e980a0a25753e137adbd95e766cecfabd946cb1be71cabce86c4e
SHA512ffb44276b9839b82db72c522887dabccaa25b2b9b870193537685ce22dd7462f6f334153175339dec5d65a4c260cea1a7e112b5643befde921a3adcc6d11e4cc
-
Filesize
1.1MB
MD52d7531259e012a4b9b6f11155f744528
SHA172f09f999c6136adcd8f038473d63222a1d07889
SHA2569e256619f883a8e87d562a12c3a4ea47a89408f5d4a1d4e1f98b6a92caab64e7
SHA51292ec207cbb7eadbd3c0ee0dd0892ecb4ebf0bc15322017732aa9248da6e71f4b846f033bdbc02daf96b9fed4f4fea138190eefe03911d0d3c047b146cb7734b4