Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:13
Behavioral task
behavioral1
Sample
09b58f11e4ad502c2631746170d86374.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
09b58f11e4ad502c2631746170d86374.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
09b58f11e4ad502c2631746170d86374.exe
-
Size
29KB
-
MD5
09b58f11e4ad502c2631746170d86374
-
SHA1
bd875fe4e47337ecdf191cf72e0f5c8c3223305e
-
SHA256
de82f50f0ede2a32202ccb63d8f3a57dc4081b1c965eaceb83c4b12d37fbce87
-
SHA512
0989aa82128803beb1b57701c6d2b75eedc437b01a47440f9c1ee8ae8d5bf864ccfb3444493ce464c88ca8cc0b922a288845b70e82bd6917d8c678af3dc87c92
-
SSDEEP
768:ty7RO9wQH6cB+jhy6pdGMXWYQ0qVf1vNVOaiC3RQcR:EIrB+U6tQ0qlvhnR
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2644-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2644-1-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/3036-2-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/3036-3-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/3036-6-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\8mA0G204.exe 09b58f11e4ad502c2631746170d86374.exe File opened for modification C:\Windows\SysWOW64\8mA0G204.exe 09b58f11e4ad502c2631746170d86374.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2700 3036 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2644 wrote to memory of 3036 2644 09b58f11e4ad502c2631746170d86374.exe 28 PID 2644 wrote to memory of 3036 2644 09b58f11e4ad502c2631746170d86374.exe 28 PID 2644 wrote to memory of 3036 2644 09b58f11e4ad502c2631746170d86374.exe 28 PID 2644 wrote to memory of 3036 2644 09b58f11e4ad502c2631746170d86374.exe 28 PID 3036 wrote to memory of 2700 3036 09b58f11e4ad502c2631746170d86374.exe 31 PID 3036 wrote to memory of 2700 3036 09b58f11e4ad502c2631746170d86374.exe 31 PID 3036 wrote to memory of 2700 3036 09b58f11e4ad502c2631746170d86374.exe 31 PID 3036 wrote to memory of 2700 3036 09b58f11e4ad502c2631746170d86374.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\09b58f11e4ad502c2631746170d86374.exe"C:\Users\Admin\AppData\Local\Temp\09b58f11e4ad502c2631746170d86374.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\09b58f11e4ad502c2631746170d86374.exe"C:\Users\Admin\AppData\Local\Temp\09b58f11e4ad502c2631746170d86374.exe" y±²³2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 2403⤵
- Program crash
PID:2700
-
-