Analysis

  • max time kernel
    240s
  • max time network
    295s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 03:38

General

  • Target

    0d3505e13b97336d111d46a65cd3f5a8.exe

  • Size

    220KB

  • MD5

    0d3505e13b97336d111d46a65cd3f5a8

  • SHA1

    0f57f31a6a19349c7532266fd1a66d977f49b5f5

  • SHA256

    0c04de9951a3657020bc0599f1a984c5708b0701c7461a030d81d4f0db768579

  • SHA512

    c5bd76deda613e7aa7146cf310e8c1e64b32b24bc14977fe5b8afee84cbf6d3e689bde92ec1f3a81b72aea4472397a4a71b20ea98c18cf0569fd1d3d0541b693

  • SSDEEP

    768:jZKM11gG4ChfiPO0rfz0shcUypMC5/VKhZyg3ini2L2o277r2MIBBehUw:gMDgG4ChfiPOefgsOUqQwgH

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 14 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d3505e13b97336d111d46a65cd3f5a8.exe
    "C:\Users\Admin\AppData\Local\Temp\0d3505e13b97336d111d46a65cd3f5a8.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 92
      2⤵
      • Program crash
      PID:1112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\Sysexp32.exe

    Filesize

    232KB

    MD5

    b1878692dc5fd520fc20e26c8e4fda76

    SHA1

    01177874639f9e2ec0467014cc135789664cdeb7

    SHA256

    f71a898d7292ecf33c35eb6c3ffbe31b455acd84e60f78148b28749e54ece891

    SHA512

    e15ea7db9b3ba6084db7cf88bf239f343ab5792b53a0ae2e0207f7eb5cd24d01d56f6ac517c7296d7f36c314e4c2cb3c12b3e76597fdcb6833b6af4912e8afe9