Analysis

  • max time kernel
    141s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 01:31

General

  • Target

    0a2566df33fe77ebd22e9acd8aae2a6e.exe

  • Size

    116KB

  • MD5

    0a2566df33fe77ebd22e9acd8aae2a6e

  • SHA1

    bb9ec9ecb3ac5fb47eea907d3c0cf69a68e8a4c4

  • SHA256

    0923ee8e7e42d5e9dee3bbd5d87b18eeee9f517f9277c380dc7484292c163410

  • SHA512

    623720e3e36257c9c6f1074ebe7be2046a231b03dd58e74c1768c012750f1bfdf4c7818b0af795953e55bc320eb4405e1d16cb15a12d851da279a514dda5c035

  • SSDEEP

    3072:i2Tk+iSbbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVU77PWuv:Nkl8wvP6bQ7yMP+DE8277PWi

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a2566df33fe77ebd22e9acd8aae2a6e.exe
    "C:\Users\Admin\AppData\Local\Temp\0a2566df33fe77ebd22e9acd8aae2a6e.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3380
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 568
      2⤵
      • Program crash
      PID:1804
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3380 -ip 3380
    1⤵
      PID:1656
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3420

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3380-0-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/3380-1-0x00000000008F0000-0x0000000000920000-memory.dmp

        Filesize

        192KB

      • memory/3380-13-0x00000000022A0000-0x00000000022A1000-memory.dmp

        Filesize

        4KB

      • memory/3380-12-0x0000000002290000-0x0000000002291000-memory.dmp

        Filesize

        4KB

      • memory/3380-11-0x0000000002270000-0x0000000002271000-memory.dmp

        Filesize

        4KB

      • memory/3380-10-0x0000000002280000-0x0000000002281000-memory.dmp

        Filesize

        4KB

      • memory/3380-9-0x0000000002250000-0x0000000002251000-memory.dmp

        Filesize

        4KB

      • memory/3380-7-0x0000000002230000-0x0000000002231000-memory.dmp

        Filesize

        4KB

      • memory/3380-8-0x0000000002260000-0x0000000002261000-memory.dmp

        Filesize

        4KB

      • memory/3380-6-0x0000000002240000-0x0000000002241000-memory.dmp

        Filesize

        4KB

      • memory/3380-5-0x00000000022D0000-0x00000000022D1000-memory.dmp

        Filesize

        4KB

      • memory/3380-14-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/3380-15-0x00000000008F0000-0x0000000000920000-memory.dmp

        Filesize

        192KB

      • memory/3380-4-0x00000000022C0000-0x00000000022C1000-memory.dmp

        Filesize

        4KB

      • memory/3380-3-0x00000000008C0000-0x00000000008C4000-memory.dmp

        Filesize

        16KB

      • memory/3380-2-0x00000000008D0000-0x00000000008D1000-memory.dmp

        Filesize

        4KB