Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:14
Behavioral task
behavioral1
Sample
37882231ea4d42523c67f1e823abfa39.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
37882231ea4d42523c67f1e823abfa39.exe
Resource
win10v2004-20231215-en
General
-
Target
37882231ea4d42523c67f1e823abfa39.exe
-
Size
805KB
-
MD5
37882231ea4d42523c67f1e823abfa39
-
SHA1
5f9a264857f9794c2a728a01d1cfa7556e9560f3
-
SHA256
063eb790f1008ac1c48f3915e7adad8af5c49c60835eadcebf7512cac34641b4
-
SHA512
98368ea758aed1893cdb6acf29dc852a5e2f07216d024fe4ddcfce79e798f8d2c2ee777627104dd1bd0010b79ef10711909463530db605a30dec8647184b1072
-
SSDEEP
24576:OZgQdNnVpyPul3hdVcN/KuJg/kmd9p2q+:mNTWPm3tcZKuJqkkG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1012 setup.exe -
resource yara_rule behavioral2/memory/3316-0-0x0000000000AD0000-0x0000000000D2C000-memory.dmp upx behavioral2/memory/3316-5-0x0000000000AD0000-0x0000000000D2C000-memory.dmp upx behavioral2/memory/1012-6-0x0000000000CB0000-0x0000000000F0C000-memory.dmp upx behavioral2/files/0x000600000002321a-4.dat upx behavioral2/memory/1012-7-0x0000000000CB0000-0x0000000000F0C000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2436 1012 WerFault.exe 87 -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3316 37882231ea4d42523c67f1e823abfa39.exe 3316 37882231ea4d42523c67f1e823abfa39.exe 1012 setup.exe 1012 setup.exe 1012 setup.exe 1012 setup.exe 1012 setup.exe 1012 setup.exe 1012 setup.exe 1012 setup.exe 1012 setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3316 wrote to memory of 1012 3316 37882231ea4d42523c67f1e823abfa39.exe 87 PID 3316 wrote to memory of 1012 3316 37882231ea4d42523c67f1e823abfa39.exe 87 PID 3316 wrote to memory of 1012 3316 37882231ea4d42523c67f1e823abfa39.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\37882231ea4d42523c67f1e823abfa39.exe"C:\Users\Admin\AppData\Local\Temp\37882231ea4d42523c67f1e823abfa39.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 16323⤵
- Program crash
PID:2436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1012 -ip 10121⤵PID:4108
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
805KB
MD537882231ea4d42523c67f1e823abfa39
SHA15f9a264857f9794c2a728a01d1cfa7556e9560f3
SHA256063eb790f1008ac1c48f3915e7adad8af5c49c60835eadcebf7512cac34641b4
SHA51298368ea758aed1893cdb6acf29dc852a5e2f07216d024fe4ddcfce79e798f8d2c2ee777627104dd1bd0010b79ef10711909463530db605a30dec8647184b1072