Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 03:04
Static task
static1
Behavioral task
behavioral1
Sample
0c736fdfb95e91847b0c78f6097a8599.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c736fdfb95e91847b0c78f6097a8599.exe
Resource
win10v2004-20231222-en
General
-
Target
0c736fdfb95e91847b0c78f6097a8599.exe
-
Size
652KB
-
MD5
0c736fdfb95e91847b0c78f6097a8599
-
SHA1
91f3cbcfec8b63728b2622931759472f77a697d3
-
SHA256
d1c1b50e061442f29de29991984951ddfeecd26d55a6b21a41812939bd21152c
-
SHA512
07d78f38dc53dc4a961a714a5e552c6508b1414bb4352e9e8c9dfc68d85b56286c8cca61f80d89767aca0db4211e9f1964c429af2bcad4a442f2d2c703aace87
-
SSDEEP
12288:YhS38YPyX+AYhn1OTe7lpPHbaBvJS4Waamaa1F3Z4mxxiX2Fi0yT8gsfw:Ys38oyX+Am1O0lFbaZJtaba1QmXTZyws
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1080 aq.exe -
Loads dropped DLL 4 IoCs
pid Process 1780 0c736fdfb95e91847b0c78f6097a8599.exe 1780 0c736fdfb95e91847b0c78f6097a8599.exe 1080 aq.exe 1080 aq.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\aq.exe 0c736fdfb95e91847b0c78f6097a8599.exe File created C:\Program Files\aq.exe 0c736fdfb95e91847b0c78f6097a8599.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1520 1780 WerFault.exe 11 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1780 0c736fdfb95e91847b0c78f6097a8599.exe 1080 aq.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1780 wrote to memory of 1080 1780 0c736fdfb95e91847b0c78f6097a8599.exe 27 PID 1780 wrote to memory of 1080 1780 0c736fdfb95e91847b0c78f6097a8599.exe 27 PID 1780 wrote to memory of 1080 1780 0c736fdfb95e91847b0c78f6097a8599.exe 27 PID 1780 wrote to memory of 1080 1780 0c736fdfb95e91847b0c78f6097a8599.exe 27 PID 1780 wrote to memory of 1520 1780 0c736fdfb95e91847b0c78f6097a8599.exe 31 PID 1780 wrote to memory of 1520 1780 0c736fdfb95e91847b0c78f6097a8599.exe 31 PID 1780 wrote to memory of 1520 1780 0c736fdfb95e91847b0c78f6097a8599.exe 31 PID 1780 wrote to memory of 1520 1780 0c736fdfb95e91847b0c78f6097a8599.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c736fdfb95e91847b0c78f6097a8599.exe"C:\Users\Admin\AppData\Local\Temp\0c736fdfb95e91847b0c78f6097a8599.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Program Files\aq.exe"C:\Program Files\aq.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 1962⤵
- Program crash
PID:1520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
692B
MD52df08f5aa8a22d0813e3f67a90a84f82
SHA15f29c292fa9c88a302aa63e77f0d8a7c5001ef93
SHA256e0de0343538eca504d12a91ba97831d48e68eddbc2d37fc114f9816f229611c4
SHA512f794ca7d2fe803fcab155f51f7eb7ced357ad58c37bf677a348ec33c65dbd88fba62ecb02368f7e5d448cd5b2258c5c875fe8c334fc7fe1272a48bbfc4c699de
-
Filesize
668B
MD51da5f91ad2de3d91f82df023c28fb839
SHA17598532187a78b173459b3cc6dee4962395ffae6
SHA256e336038d29ecd902f8da648dab536fe8ffe52164921cbdb2e9e459cf05743562
SHA512353201166bb6e864fbaa1fa4af8dd4b13c604a7779cef98afade77fb7622cb92aaa2a07eee1aa84d86ce607e6ff6451ac0dfbc0bcb260c15386d108620d8b7b4
-
Filesize
652KB
MD50c736fdfb95e91847b0c78f6097a8599
SHA191f3cbcfec8b63728b2622931759472f77a697d3
SHA256d1c1b50e061442f29de29991984951ddfeecd26d55a6b21a41812939bd21152c
SHA51207d78f38dc53dc4a961a714a5e552c6508b1414bb4352e9e8c9dfc68d85b56286c8cca61f80d89767aca0db4211e9f1964c429af2bcad4a442f2d2c703aace87