Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 03:04
Static task
static1
Behavioral task
behavioral1
Sample
0c736fdfb95e91847b0c78f6097a8599.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c736fdfb95e91847b0c78f6097a8599.exe
Resource
win10v2004-20231222-en
General
-
Target
0c736fdfb95e91847b0c78f6097a8599.exe
-
Size
652KB
-
MD5
0c736fdfb95e91847b0c78f6097a8599
-
SHA1
91f3cbcfec8b63728b2622931759472f77a697d3
-
SHA256
d1c1b50e061442f29de29991984951ddfeecd26d55a6b21a41812939bd21152c
-
SHA512
07d78f38dc53dc4a961a714a5e552c6508b1414bb4352e9e8c9dfc68d85b56286c8cca61f80d89767aca0db4211e9f1964c429af2bcad4a442f2d2c703aace87
-
SSDEEP
12288:YhS38YPyX+AYhn1OTe7lpPHbaBvJS4Waamaa1F3Z4mxxiX2Fi0yT8gsfw:Ys38oyX+Am1O0lFbaZJtaba1QmXTZyws
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2760 aq.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\aq.exe 0c736fdfb95e91847b0c78f6097a8599.exe File opened for modification C:\Program Files\aq.exe 0c736fdfb95e91847b0c78f6097a8599.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3876 4088 WerFault.exe 60 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4088 0c736fdfb95e91847b0c78f6097a8599.exe 4088 0c736fdfb95e91847b0c78f6097a8599.exe 2760 aq.exe 2760 aq.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4088 wrote to memory of 2760 4088 0c736fdfb95e91847b0c78f6097a8599.exe 90 PID 4088 wrote to memory of 2760 4088 0c736fdfb95e91847b0c78f6097a8599.exe 90 PID 4088 wrote to memory of 2760 4088 0c736fdfb95e91847b0c78f6097a8599.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c736fdfb95e91847b0c78f6097a8599.exe"C:\Users\Admin\AppData\Local\Temp\0c736fdfb95e91847b0c78f6097a8599.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Program Files\aq.exe"C:\Program Files\aq.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 4922⤵
- Program crash
PID:3876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4088 -ip 40881⤵PID:4560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
652KB
MD50c736fdfb95e91847b0c78f6097a8599
SHA191f3cbcfec8b63728b2622931759472f77a697d3
SHA256d1c1b50e061442f29de29991984951ddfeecd26d55a6b21a41812939bd21152c
SHA51207d78f38dc53dc4a961a714a5e552c6508b1414bb4352e9e8c9dfc68d85b56286c8cca61f80d89767aca0db4211e9f1964c429af2bcad4a442f2d2c703aace87
-
Filesize
729B
MD503bf00de04d3454572d8544cec3a1557
SHA13f3ffd70c0ef677ccbc7ca0332726f54eac1fbdd
SHA2566f78dd6693d88806bcb5a15e6629e9f3b9726732e8ca53d9e40eaad25d4e1f01
SHA512db26d75e93a9da80f77422b5260970ea47de99c72504702ef0a450a14e1a3027bb6bbb7966c7f8feab1353851fb6478f4e0b6dcff723ff3671c97a3accd26ada
-
Filesize
705B
MD516de3e17e461d96d7e30a0bb76988583
SHA131c1d2bec34e43fc67cb14d171f522edd1af54ef
SHA2561d8ba00556a167ee4d1aa0085c34df2e5eb605e287c45166c2690e07612b4b11
SHA51269ab9ee7c82d8bb89bd2d94875a4a12a0ddf3cb547415d4724763e8c36ccf78864b6791a4eea89bdd055d832c10b1c8a27fc11a9184dee2abf87f796ec5939ec