Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:37
Static task
static1
Behavioral task
behavioral1
Sample
0eb5fa03b8eea1751bd012eda206e292.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0eb5fa03b8eea1751bd012eda206e292.exe
Resource
win10v2004-20231215-en
General
-
Target
0eb5fa03b8eea1751bd012eda206e292.exe
-
Size
4.8MB
-
MD5
0eb5fa03b8eea1751bd012eda206e292
-
SHA1
acbbe2bf3e972d6fc33687fa5a2cf6f3cecbb7bc
-
SHA256
918d21e0aa5f61096587321f0a4f12e3119db076991447527d64be7e79d98e88
-
SHA512
701385146d7a732b3235a5669d13e159aec263139669e18ba7aa4fa52a72c4cdd588683386d078f7cb629c9b17f2793e785162caf89dc6b77c5f6a610f752791
-
SSDEEP
98304:Z966KEjyRoJbKbh6lfHYx2VAyRGhk3/K8rXWIyJhyY+wWAr2ZW2SXnjyXIcd:DdjyRqKb4lgKCMS82J/mSXnj8F
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2472 0eb5fa03b8eea1751bd012eda206e292.exe 2472 0eb5fa03b8eea1751bd012eda206e292.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\hosts 0eb5fa03b8eea1751bd012eda206e292.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2264 2472 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2264 2472 0eb5fa03b8eea1751bd012eda206e292.exe 28 PID 2472 wrote to memory of 2264 2472 0eb5fa03b8eea1751bd012eda206e292.exe 28 PID 2472 wrote to memory of 2264 2472 0eb5fa03b8eea1751bd012eda206e292.exe 28 PID 2472 wrote to memory of 2264 2472 0eb5fa03b8eea1751bd012eda206e292.exe 28 PID 2472 wrote to memory of 2264 2472 0eb5fa03b8eea1751bd012eda206e292.exe 28 PID 2472 wrote to memory of 2264 2472 0eb5fa03b8eea1751bd012eda206e292.exe 28 PID 2472 wrote to memory of 2264 2472 0eb5fa03b8eea1751bd012eda206e292.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eb5fa03b8eea1751bd012eda206e292.exe"C:\Users\Admin\AppData\Local\Temp\0eb5fa03b8eea1751bd012eda206e292.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 4962⤵
- Program crash
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD51f49d4c2104ecdd5145b798ada70c2c2
SHA16de3e1d84a59765dbe496175f2b6ea00997fd8e5
SHA25677b08d71140e8e86b03cd183698144ce34cce98503903a964a26a7e6d82c5338
SHA512825991196d5d84cd43a0d27e124b1b46671877f496efc515abbe2bcf9b26ad05cb0a8baaa2aa96d025c516f8bfb1a6cb390e96fc1ea417afb135598a72ea9b69
-
Filesize
28KB
MD5e28be8e274101ca09d76ec18cb577679
SHA1399425a3ac1abfa34a755f32b5488e2440f9b5cc
SHA2560646ee9f41cb3080134f7d033a5d30bd58d6966f55f6ce6ce88c7963647b5142
SHA5120521f518bfba0e9b9785f210e6a598e114e444e2b397e7b4bc07c4edae7b86b0f64fe747f6b389fb62804e80164a1ba866fac84632325157afb9afb35c3bcf1c