Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 22:06
Behavioral task
behavioral1
Sample
1df6b8284f2ee66d546efa938f571765.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1df6b8284f2ee66d546efa938f571765.exe
Resource
win10v2004-20231215-en
General
-
Target
1df6b8284f2ee66d546efa938f571765.exe
-
Size
1.1MB
-
MD5
1df6b8284f2ee66d546efa938f571765
-
SHA1
f56428c36db6657f2b90fe691d19439cb7159013
-
SHA256
2001fa457ae8c2ec82ee261e185b842b622bae3ead54e68434899a182190ddbe
-
SHA512
d6f38989469551d4f2032538043aba9a30e76d03b86d594cdc7d8736f150b2c593117aff9388d807628d7afbfdbc5edb5831dd03696d72ed724d986145c5f8c4
-
SSDEEP
24576:1NHlDWGouKPL+mk2ksI/rq38Xn27Y+A4eoEdbMP6KmZmY0x3ZWUhPokTM:1/XoVL+J2j9MXyY+ibNC643n9o3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3364 setup.exe -
resource yara_rule behavioral2/memory/1492-0-0x0000000000FE0000-0x0000000001234000-memory.dmp upx behavioral2/memory/3364-6-0x00000000009C0000-0x0000000000C14000-memory.dmp upx behavioral2/memory/1492-5-0x0000000000FE0000-0x0000000001234000-memory.dmp upx behavioral2/files/0x0009000000023224-4.dat upx behavioral2/files/0x0009000000023224-3.dat upx behavioral2/memory/3364-7-0x00000000009C0000-0x0000000000C14000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3764 3364 WerFault.exe 18 -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1492 1df6b8284f2ee66d546efa938f571765.exe 1492 1df6b8284f2ee66d546efa938f571765.exe 3364 setup.exe 3364 setup.exe 3364 setup.exe 3364 setup.exe 3364 setup.exe 3364 setup.exe 3364 setup.exe 3364 setup.exe 3364 setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1492 wrote to memory of 3364 1492 1df6b8284f2ee66d546efa938f571765.exe 18 PID 1492 wrote to memory of 3364 1492 1df6b8284f2ee66d546efa938f571765.exe 18 PID 1492 wrote to memory of 3364 1492 1df6b8284f2ee66d546efa938f571765.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\1df6b8284f2ee66d546efa938f571765.exe"C:\Users\Admin\AppData\Local\Temp\1df6b8284f2ee66d546efa938f571765.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 16003⤵
- Program crash
PID:3764
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3364 -ip 33641⤵PID:1444
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD51df6b8284f2ee66d546efa938f571765
SHA1f56428c36db6657f2b90fe691d19439cb7159013
SHA2562001fa457ae8c2ec82ee261e185b842b622bae3ead54e68434899a182190ddbe
SHA512d6f38989469551d4f2032538043aba9a30e76d03b86d594cdc7d8736f150b2c593117aff9388d807628d7afbfdbc5edb5831dd03696d72ed724d986145c5f8c4
-
Filesize
898KB
MD51b693805f2645a57084bdc85eab7cd15
SHA111471486fcdd18acb099bc48b57d91996e1f2ee5
SHA256231d05ceffb7f1737c3c70993e41583483baabde69b41d63dd93b50b705a8aca
SHA51276df2db476fc4636d4202bee0d1f70480a30ba02a10f8f8b79b43686d50af12188bb3687746c44ef7bfb75493976ada429abc5ab87f8300be22a923b49aefec6