Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
1d662ea2e3d43bac14df7e230ad75e9e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d662ea2e3d43bac14df7e230ad75e9e.exe
Resource
win10v2004-20231215-en
General
-
Target
1d662ea2e3d43bac14df7e230ad75e9e.exe
-
Size
31KB
-
MD5
1d662ea2e3d43bac14df7e230ad75e9e
-
SHA1
0490efb449b5750267cf15dbe54f2cfde255e4e0
-
SHA256
ab05e0e9e519d769861cc6e84e4a7ae8ea60c94f378fc9c786a9a6c0861df7f4
-
SHA512
98c66f615ee291336622ab0a4814122c4c15a840a1e1597cf7e4984582758ea6f78601f8b0af5dba762cf3d5cee1afe6c7092f98b0f5fd8028b5d00cd595ce52
-
SSDEEP
768:DVjaBy+G3b5vjYaUzqXgxZvEx4M8f8djBrxXYb1FC6:BjaBxG3b5vjpUzqXgx9EJ8f8NBrJOK6
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 3640 1d662ea2e3d43bac14df7e230ad75e9e.exe 3640 1d662ea2e3d43bac14df7e230ad75e9e.exe 1604 regsvr32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3088 1604 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3640 1d662ea2e3d43bac14df7e230ad75e9e.exe 3640 1d662ea2e3d43bac14df7e230ad75e9e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3640 wrote to memory of 3612 3640 1d662ea2e3d43bac14df7e230ad75e9e.exe 89 PID 3640 wrote to memory of 3612 3640 1d662ea2e3d43bac14df7e230ad75e9e.exe 89 PID 3640 wrote to memory of 3612 3640 1d662ea2e3d43bac14df7e230ad75e9e.exe 89 PID 3640 wrote to memory of 1604 3640 1d662ea2e3d43bac14df7e230ad75e9e.exe 90 PID 3640 wrote to memory of 1604 3640 1d662ea2e3d43bac14df7e230ad75e9e.exe 90 PID 3640 wrote to memory of 1604 3640 1d662ea2e3d43bac14df7e230ad75e9e.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d662ea2e3d43bac14df7e230ad75e9e.exe"C:\Users\Admin\AppData\Local\Temp\1d662ea2e3d43bac14df7e230ad75e9e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\1d662ea2e3d43bac14df7e230ad75e9e.exe"C:\Users\Admin\AppData\Local\Temp\1d662ea2e3d43bac14df7e230ad75e9e.exe" "C:\Users\Admin\AppData\Local\Temp\clean_e5768ad.dll"2⤵PID:3612
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s /n /i:"C:\Users\Admin\AppData\Local\Temp\1d662ea2e3d43bac14df7e230ad75e9e.exe" "C:\Users\Admin\AppData\Local\Temp\clean_e5768ad.dll"2⤵
- Loads dropped DLL
PID:1604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 6283⤵
- Program crash
PID:3088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1604 -ip 16041⤵PID:1856
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5205b09bc281a7968b39472c52329c916
SHA1ff5f27988ba3458513314f0ccba2fadb01202a55
SHA256a8cc5ca2d8ac0f0179ce859451f33f4b909a6d3d9beec60587a47398897a0122
SHA5122c070d8b886e679e49dec78e1ebb7d409c059cb1b1f9b70c09de4c208651d34f3c768514f22d37d0da6f47b8e259d5e6e7db34399e0beff2bd6955e4dfb32097