Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 17:36
Behavioral task
behavioral1
Sample
3aa677e6cd48cf04b72c028876feb7fc.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3aa677e6cd48cf04b72c028876feb7fc.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
3aa677e6cd48cf04b72c028876feb7fc.exe
-
Size
29KB
-
MD5
3aa677e6cd48cf04b72c028876feb7fc
-
SHA1
f1f449f93edf341152656cf8bda900fed531afd9
-
SHA256
99a31bf28a084174c24db2c94f331afc88b8920ea9a803d06a89a723edae563e
-
SHA512
7b089abc82529427c68219416e8dd0eaa55ccf86be287dc45bf5e75202a24d3e17aee60fcbd01f1287c712be5a4148d9bf802939de518ef544c4a2ba251f9fad
-
SSDEEP
768:DrbBqnFaaYsMldzvCOVtdNrEhzACORUc7:/bBqnFjMldLxLdehznaD7
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1644-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/1548-2-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/1644-1-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\D4giMmq0.exe 3aa677e6cd48cf04b72c028876feb7fc.exe File opened for modification C:\Windows\SysWOW64\D4giMmq0.exe 3aa677e6cd48cf04b72c028876feb7fc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2800 1548 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1644 wrote to memory of 1548 1644 3aa677e6cd48cf04b72c028876feb7fc.exe 28 PID 1644 wrote to memory of 1548 1644 3aa677e6cd48cf04b72c028876feb7fc.exe 28 PID 1644 wrote to memory of 1548 1644 3aa677e6cd48cf04b72c028876feb7fc.exe 28 PID 1644 wrote to memory of 1548 1644 3aa677e6cd48cf04b72c028876feb7fc.exe 28 PID 1548 wrote to memory of 2800 1548 3aa677e6cd48cf04b72c028876feb7fc.exe 29 PID 1548 wrote to memory of 2800 1548 3aa677e6cd48cf04b72c028876feb7fc.exe 29 PID 1548 wrote to memory of 2800 1548 3aa677e6cd48cf04b72c028876feb7fc.exe 29 PID 1548 wrote to memory of 2800 1548 3aa677e6cd48cf04b72c028876feb7fc.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aa677e6cd48cf04b72c028876feb7fc.exe"C:\Users\Admin\AppData\Local\Temp\3aa677e6cd48cf04b72c028876feb7fc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\3aa677e6cd48cf04b72c028876feb7fc.exe"C:\Users\Admin\AppData\Local\Temp\3aa677e6cd48cf04b72c028876feb7fc.exe" y±²³2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 2403⤵
- Program crash
PID:2800
-
-