Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
20c0e56ffac6877b03141f0fdb7a8050.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
20c0e56ffac6877b03141f0fdb7a8050.exe
Resource
win10v2004-20231222-en
General
-
Target
20c0e56ffac6877b03141f0fdb7a8050.exe
-
Size
22KB
-
MD5
20c0e56ffac6877b03141f0fdb7a8050
-
SHA1
6cfea95cfe792fd7e39ef5bd09a6f4308497bec8
-
SHA256
8ccde9f3a3009303d6c64005c9c34aa23496355c97a15bc1a3b97706b8ddb13c
-
SHA512
6abd600973469440b7232ad75a4a75446716a63740f2d79536948abe01bcd68460b384435cb03659f9171251a46de87f2d5443781607a9d4c2cf751da93f95ff
-
SSDEEP
384:09u3U5ZpvLw5ikMN2Iqt5l1Q8dEike1z0KCCdDZcXYXkxCNGMWVk:NWvsc1N2Iqnd/dDOXYUGW
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2392 20c0e56ffac6877b03141f0fdb7a8050.exe 2548 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\netsrvcs.dll 20c0e56ffac6877b03141f0fdb7a8050.exe File created C:\Windows\SysWOW64\netsrvcs.dll 20c0e56ffac6877b03141f0fdb7a8050.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2548 2392 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2392 20c0e56ffac6877b03141f0fdb7a8050.exe 2392 20c0e56ffac6877b03141f0fdb7a8050.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2548 2392 20c0e56ffac6877b03141f0fdb7a8050.exe 28 PID 2392 wrote to memory of 2548 2392 20c0e56ffac6877b03141f0fdb7a8050.exe 28 PID 2392 wrote to memory of 2548 2392 20c0e56ffac6877b03141f0fdb7a8050.exe 28 PID 2392 wrote to memory of 2548 2392 20c0e56ffac6877b03141f0fdb7a8050.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\20c0e56ffac6877b03141f0fdb7a8050.exe"C:\Users\Admin\AppData\Local\Temp\20c0e56ffac6877b03141f0fdb7a8050.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 962⤵
- Loads dropped DLL
- Program crash
PID:2548
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5492a0d2302f49bd3afceec4e7ba24442
SHA130435d0395a10a4001267e1df6ec5394b5918b34
SHA2564c86bfb2270420abe2bb6a8c77dd7f6ec9480aeaf617187244da3996a2302d36
SHA512ce8d9b4bbd8989e63d17e72478b2858f8db958ba5d775f35bbf75ab3a4b7b71a0c06a4606013f54aa6a4e8d63009fdfa3dd197fb4f2ab0391452076f27f974d4