Analysis
-
max time kernel
137s -
max time network
79s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 08:23
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
d28f799d666a23fda187776242073993.exe
Resource
win7-20231215-en
18 signatures
150 seconds
Behavioral task
behavioral2
Sample
d28f799d666a23fda187776242073993.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
d28f799d666a23fda187776242073993.exe
-
Size
101KB
-
MD5
d28f799d666a23fda187776242073993
-
SHA1
33228c4a1dfe34c2ddd8400300890447dc951f7c
-
SHA256
f9c4ddad16bf3d2446639ed848334a2c1741af3fab677199c7aef6b5bf6f098e
-
SHA512
85c27c26b9d322da4ea228be4b23e4b9b036ab6fa61d211c1e150fb88af556ef1c28c1f038d354fb9b34a3eb4911f8e278aa42632b2a4eacc1cf511f67962ff5
-
SSDEEP
3072:ef1BDZ0kVB67Duw9AMc9sKXbxGM63ikxBbcy6TwYpgI:e9X0G1x363ikxewYpJ
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2164 d28f799d666a23fda187776242073993.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 844 2164 WerFault.exe 16 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2164 wrote to memory of 3524 2164 d28f799d666a23fda187776242073993.exe 95 PID 2164 wrote to memory of 3524 2164 d28f799d666a23fda187776242073993.exe 95 PID 2164 wrote to memory of 3524 2164 d28f799d666a23fda187776242073993.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\d28f799d666a23fda187776242073993.exe"C:\Users\Admin\AppData\Local\Temp\d28f799d666a23fda187776242073993.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 9482⤵
- Program crash
PID:844
-
-
C:\Users\Admin\AppData\Local\Temp\d28f799d666a23fda187776242073993.exe"C:\Users\Admin\AppData\Local\Temp\d28f799d666a23fda187776242073993.exe"2⤵PID:3524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2164 -ip 21641⤵PID:4044