Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 19:00
Behavioral task
behavioral1
Sample
011ccce50d53907ab0a23ac0001c3cde.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
011ccce50d53907ab0a23ac0001c3cde.exe
Resource
win10v2004-20231215-en
General
-
Target
011ccce50d53907ab0a23ac0001c3cde.exe
-
Size
114KB
-
MD5
011ccce50d53907ab0a23ac0001c3cde
-
SHA1
2dc133ef673dda3f0c1713dedd3e9f1b1bc6e4ca
-
SHA256
727635bd383afc5c92e83749368926f6fa7d6da4f4ed15c406275bef570ed300
-
SHA512
4fa9afbe35f653b3621dd4a84e6ee6b694a51b3bafd345a2c98f73129606ea748257a86cfd8ac88557cc258623a27949fb935f44d2bf3238049d902d670a0b52
-
SSDEEP
1536:pHdaBx5I0U23QhFmO0YAI1jwx9WkLniiOBikEOx/RqZsdSJv+8j+/SiTpHW:xaq0U2Jajwx99qRqZsQ9njGSiTR
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0034000000016fc4-7.dat aspack_v212_v242 -
Loads dropped DLL 1 IoCs
pid Process 816 011ccce50d53907ab0a23ac0001c3cde.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\dso32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dsoqq.exe" 011ccce50d53907ab0a23ac0001c3cde.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2300 816 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 816 011ccce50d53907ab0a23ac0001c3cde.exe 816 011ccce50d53907ab0a23ac0001c3cde.exe 816 011ccce50d53907ab0a23ac0001c3cde.exe 816 011ccce50d53907ab0a23ac0001c3cde.exe 816 011ccce50d53907ab0a23ac0001c3cde.exe 816 011ccce50d53907ab0a23ac0001c3cde.exe 816 011ccce50d53907ab0a23ac0001c3cde.exe 816 011ccce50d53907ab0a23ac0001c3cde.exe 816 011ccce50d53907ab0a23ac0001c3cde.exe 816 011ccce50d53907ab0a23ac0001c3cde.exe 816 011ccce50d53907ab0a23ac0001c3cde.exe 816 011ccce50d53907ab0a23ac0001c3cde.exe 816 011ccce50d53907ab0a23ac0001c3cde.exe 816 011ccce50d53907ab0a23ac0001c3cde.exe 816 011ccce50d53907ab0a23ac0001c3cde.exe 816 011ccce50d53907ab0a23ac0001c3cde.exe 816 011ccce50d53907ab0a23ac0001c3cde.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 816 wrote to memory of 1200 816 011ccce50d53907ab0a23ac0001c3cde.exe 21 PID 816 wrote to memory of 2300 816 011ccce50d53907ab0a23ac0001c3cde.exe 28 PID 816 wrote to memory of 2300 816 011ccce50d53907ab0a23ac0001c3cde.exe 28 PID 816 wrote to memory of 2300 816 011ccce50d53907ab0a23ac0001c3cde.exe 28 PID 816 wrote to memory of 2300 816 011ccce50d53907ab0a23ac0001c3cde.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\011ccce50d53907ab0a23ac0001c3cde.exe"C:\Users\Admin\AppData\Local\Temp\011ccce50d53907ab0a23ac0001c3cde.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 816 -s 1683⤵
- Program crash
PID:2300
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD581a0c29630333eda2787b07069ac56b0
SHA1899d0fff3ac3fdd10b87395081e834d9561b41a6
SHA2560d70202df773676f64ae55740e4d11196107c05669c7d24ee35fa494a12bda4b
SHA512c3e814bdf506cc1cd3a86b0ee267cb71726e884233ccca1f6ecd20c674d9416952bf2732c3e1bdcd729c61d740133158f33c59f1084634550d8e8ca2d47a9d34