Overview
overview
10Static
static
10samples (2) (2).zip
windows7-x64
1samples (2) (2).zip
windows10-2004-x64
1083e147374...08.exe
windows7-x64
8083e147374...08.exe
windows10-2004-x64
812437a49d2...3d.exe
windows7-x64
712437a49d2...3d.exe
windows10-2004-x64
71945c44901...7e.exe
windows7-x64
91945c44901...7e.exe
windows10-2004-x64
102040fa2a3c...d4.exe
windows7-x64
12040fa2a3c...d4.exe
windows10-2004-x64
12b5109e9a2...d9.exe
windows7-x64
102b5109e9a2...d9.exe
windows10-2004-x64
103538750cfe...5f.exe
windows7-x64
103538750cfe...5f.exe
windows10-2004-x64
105d96952d47...5f.exe
windows7-x64
105d96952d47...5f.exe
windows10-2004-x64
1063fb410fc5...22.exe
windows7-x64
763fb410fc5...22.exe
windows10-2004-x64
767beeb7a19...08.exe
windows7-x64
367beeb7a19...08.exe
windows10-2004-x64
16e5678ebd4...71.exe
windows7-x64
36e5678ebd4...71.exe
windows10-2004-x64
371506a3322...fb.exe
windows7-x64
1071506a3322...fb.exe
windows10-2004-x64
10734b9974ec...6d.exe
windows7-x64
10734b9974ec...6d.exe
windows10-2004-x64
1081a27b3dcf...40.exe
windows7-x64
981a27b3dcf...40.exe
windows10-2004-x64
10a1bd0fa8ad...46.exe
windows7-x64
10a1bd0fa8ad...46.exe
windows10-2004-x64
10a465bc0871...e3.exe
windows7-x64
6a465bc0871...e3.exe
windows10-2004-x64
6Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 15:12
Behavioral task
behavioral1
Sample
samples (2) (2).zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
samples (2) (2).zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
083e147374de04930caa882acaeda6df4821b75f869edb7386281f684e573c08.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
083e147374de04930caa882acaeda6df4821b75f869edb7386281f684e573c08.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
1945c44901e7aa9dd5b6e7e6e07a777d57f7e76120a3ca5a46a0f983d30ce37e.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
1945c44901e7aa9dd5b6e7e6e07a777d57f7e76120a3ca5a46a0f983d30ce37e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
2040fa2a3c5b16d74442d41d224a6ab16e0290a30f0535b18cb50de6a59686d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
2040fa2a3c5b16d74442d41d224a6ab16e0290a30f0535b18cb50de6a59686d4.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
2b5109e9a249a795a412a3961aae3e5b576a233d9681f5ec0b4d88ce009b6ed9.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
2b5109e9a249a795a412a3961aae3e5b576a233d9681f5ec0b4d88ce009b6ed9.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
3538750cfe06d8fe364bc4f396229bfd08c9856f17477b0f8444d35a7f89775f.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
3538750cfe06d8fe364bc4f396229bfd08c9856f17477b0f8444d35a7f89775f.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
5d96952d473d386285f01726073d8f1ec46c983fe4c9d657babe9272330d655f.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
5d96952d473d386285f01726073d8f1ec46c983fe4c9d657babe9272330d655f.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
63fb410fc5267c61c5099927af714a8f5f4ba6dcdeeb1f297b022879767c7222.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
63fb410fc5267c61c5099927af714a8f5f4ba6dcdeeb1f297b022879767c7222.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
67beeb7a196a91ffdb77af4e53143e75a157ea6cf3432a2e14e1c55d11ef2f08.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
67beeb7a196a91ffdb77af4e53143e75a157ea6cf3432a2e14e1c55d11ef2f08.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
6e5678ebd457353b7c095af806f92b5f54341bbfa2c8d3f5ab03b84483013271.exe
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
6e5678ebd457353b7c095af806f92b5f54341bbfa2c8d3f5ab03b84483013271.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
71506a3322b0e0bc6fc2c1a1f0ac844a82a8c3fbbfeb4e6452013b4ade7610fb.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
71506a3322b0e0bc6fc2c1a1f0ac844a82a8c3fbbfeb4e6452013b4ade7610fb.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
734b9974ec7f673460deb7ae17af4eed0ad6fae862f0765068430050fc44d66d.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
734b9974ec7f673460deb7ae17af4eed0ad6fae862f0765068430050fc44d66d.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
81a27b3dcfbd52ceb68043465a9aaa3ff6a2e4d04e487197bb23db5c76eec740.exe
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
81a27b3dcfbd52ceb68043465a9aaa3ff6a2e4d04e487197bb23db5c76eec740.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
a1bd0fa8ada1da0181b8d108ca72a41795b55060613e0182f2cbbc592f857f46.exe
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
a1bd0fa8ada1da0181b8d108ca72a41795b55060613e0182f2cbbc592f857f46.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
a465bc08714bc760130a3f150a704df2f08af083b2aaf0c931e714019f3769e3.exe
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
a465bc08714bc760130a3f150a704df2f08af083b2aaf0c931e714019f3769e3.exe
Resource
win10v2004-20231215-en
General
-
Target
12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe
-
Size
426KB
-
MD5
11db0fc2064d7c858067b99b413e357b
-
SHA1
dbfe691315009c224e3b826dfb89ac7d910a7f08
-
SHA256
12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d
-
SHA512
120153a24b079eda7a55f97b31a7827f34ee8e6a69593180f0588ebc38efcee6c7a90131af366f9c0ce55288247bf4b6ab5fd9541ed365370f1f42c279ab93d8
-
SSDEEP
12288:qntVoEco+qy0h6/id8Mq560WjLM7Ti/L6tdEyvIG9ij8e:mVdcvr0hCoV8OjvUdEyvItjd
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2556 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 2556 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2556 set thread context of 2368 2556 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 28 PID 2368 set thread context of 2728 2368 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2732 2728 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2368 2556 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 28 PID 2556 wrote to memory of 2368 2556 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 28 PID 2556 wrote to memory of 2368 2556 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 28 PID 2556 wrote to memory of 2368 2556 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 28 PID 2556 wrote to memory of 2368 2556 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 28 PID 2556 wrote to memory of 2368 2556 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 28 PID 2556 wrote to memory of 2368 2556 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 28 PID 2556 wrote to memory of 2368 2556 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 28 PID 2556 wrote to memory of 2368 2556 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 28 PID 2556 wrote to memory of 2368 2556 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 28 PID 2368 wrote to memory of 2728 2368 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 29 PID 2368 wrote to memory of 2728 2368 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 29 PID 2368 wrote to memory of 2728 2368 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 29 PID 2368 wrote to memory of 2728 2368 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 29 PID 2368 wrote to memory of 2728 2368 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 29 PID 2368 wrote to memory of 2728 2368 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 29 PID 2368 wrote to memory of 2728 2368 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 29 PID 2368 wrote to memory of 2728 2368 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 29 PID 2368 wrote to memory of 2728 2368 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 29 PID 2368 wrote to memory of 2728 2368 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 29 PID 2368 wrote to memory of 2728 2368 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 29 PID 2728 wrote to memory of 2732 2728 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 30 PID 2728 wrote to memory of 2732 2728 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 30 PID 2728 wrote to memory of 2732 2728 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 30 PID 2728 wrote to memory of 2732 2728 12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe"C:\Users\Admin\AppData\Local\Temp\12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe"C:\Users\Admin\AppData\Local\Temp\12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe"C:\Users\Admin\AppData\Local\Temp\12437a49d298941af8d087a1ff478a68ab4c312654153e17d598ff1c87be6b3d.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 2524⤵
- Program crash
PID:2732
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
31KB
MD520db1318c41392a11c364dbae4d92a33
SHA18d149540748c28650f0d41fc5d81a0c107e6b0a7
SHA25616798bd307889cad431040ad323af1c47b2acd889e4ee62d926d41144454c451
SHA512c7b7657365e5a1f377f18fe92dcf2868dc2ab842fb69d449b8851946f39867c16adbd7cf8ce13475bdde1bff5678e258aa8792fcb873b762cab8c0fb961d3b8f