Analysis
-
max time kernel
147s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 15:59
Static task
static1
Behavioral task
behavioral1
Sample
7ade31e485c4e7500d6e52288f0abfe9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ade31e485c4e7500d6e52288f0abfe9.exe
Resource
win10v2004-20231215-en
General
-
Target
7ade31e485c4e7500d6e52288f0abfe9.exe
-
Size
120KB
-
MD5
7ade31e485c4e7500d6e52288f0abfe9
-
SHA1
794d374658b19fe90c92fcbe70c7277cf756b30c
-
SHA256
c252139e031854594312b717ea84c8d71a2089667421a6046dea0ce9e7e8c08c
-
SHA512
96dac847de6ea633a872aead04eae2b92557129d895ad2b98b54cee613c87a9ee4c16303e1775f85fe12a12be788a1f09fb7f23b12e45aac4621ee47066fec97
-
SSDEEP
3072:N/uEwf9se/JUkxR9uSstfCojxsdQk9sgc:N/uffOCuQRZstFxsdl9s
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A} 7ade31e485c4e7500d6e52288f0abfe9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A}\StubPath = "C:\\Program Files\\CTFMOM.EXE" 7ade31e485c4e7500d6e52288f0abfe9.exe -
Executes dropped EXE 1 IoCs
pid Process 3944 CTFMOM.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3944 set thread context of 4396 3944 CTFMOM.EXE 41 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\CTFMOM.EXE 7ade31e485c4e7500d6e52288f0abfe9.exe File created C:\Program Files\CTFMOM.EXE 7ade31e485c4e7500d6e52288f0abfe9.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 4196 4100 WerFault.exe 14 4256 3944 WerFault.exe 4664 4396 WerFault.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4100 wrote to memory of 3944 4100 7ade31e485c4e7500d6e52288f0abfe9.exe 37 PID 4100 wrote to memory of 3944 4100 7ade31e485c4e7500d6e52288f0abfe9.exe 37 PID 4100 wrote to memory of 3944 4100 7ade31e485c4e7500d6e52288f0abfe9.exe 37 PID 3944 wrote to memory of 4396 3944 CTFMOM.EXE 41 PID 3944 wrote to memory of 4396 3944 CTFMOM.EXE 41 PID 3944 wrote to memory of 4396 3944 CTFMOM.EXE 41 PID 3944 wrote to memory of 4396 3944 CTFMOM.EXE 41 PID 3944 wrote to memory of 4396 3944 CTFMOM.EXE 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ade31e485c4e7500d6e52288f0abfe9.exe"C:\Users\Admin\AppData\Local\Temp\7ade31e485c4e7500d6e52288f0abfe9.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 5362⤵
- Program crash
PID:4196
-
-
C:\Program Files\CTFMOM.EXE"C:\Program Files\CTFMOM.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\userinit.exeC:\Windows\SYSTEM32\userinit.exe3⤵PID:4396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4100 -ip 41001⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3944 -ip 39441⤵PID:4620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 5321⤵
- Program crash
PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 5121⤵
- Program crash
PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4396 -ip 43961⤵PID:4896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD57ade31e485c4e7500d6e52288f0abfe9
SHA1794d374658b19fe90c92fcbe70c7277cf756b30c
SHA256c252139e031854594312b717ea84c8d71a2089667421a6046dea0ce9e7e8c08c
SHA51296dac847de6ea633a872aead04eae2b92557129d895ad2b98b54cee613c87a9ee4c16303e1775f85fe12a12be788a1f09fb7f23b12e45aac4621ee47066fec97