Analysis
-
max time kernel
145s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 13:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3eab7a22cef50ebc85d90d3fdf2e8ead.exe
Resource
win7-20231129-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
3eab7a22cef50ebc85d90d3fdf2e8ead.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
3eab7a22cef50ebc85d90d3fdf2e8ead.exe
-
Size
746KB
-
MD5
3eab7a22cef50ebc85d90d3fdf2e8ead
-
SHA1
bf14a9127ae7bf6fcff4e9fbd0412702f1ba365b
-
SHA256
1e4bc66d1d7b3e962e8b6840e0181315455deb487a3afbd620a3e027f02615ac
-
SHA512
70e9ec68db1f66201e511127e9e3594c8bc02008fd294896366dd2a506da2f10198b48ab290667401440e6d6bf0f84fd84b7f24ec076d74d68e4cdea12b20d21
-
SSDEEP
12288:kvuJzqumavLunZ2zshEeJPyDw3W+PmYNaV+ium2lI7uT:OfPqRzlCPyDwvPmYNaHum2lIq
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1204 help.com -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\help.com 3eab7a22cef50ebc85d90d3fdf2e8ead.exe File opened for modification C:\Windows\SysWOW64\help.com 3eab7a22cef50ebc85d90d3fdf2e8ead.exe File opened for modification C:\Windows\SysWOW64\help.com help.com -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\uninstal.bat 3eab7a22cef50ebc85d90d3fdf2e8ead.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5032 4492 WerFault.exe 14 2864 1204 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4492 3eab7a22cef50ebc85d90d3fdf2e8ead.exe Token: SeDebugPrivilege 1204 help.com -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4492 wrote to memory of 4860 4492 3eab7a22cef50ebc85d90d3fdf2e8ead.exe 99 PID 4492 wrote to memory of 4860 4492 3eab7a22cef50ebc85d90d3fdf2e8ead.exe 99 PID 4492 wrote to memory of 4860 4492 3eab7a22cef50ebc85d90d3fdf2e8ead.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\3eab7a22cef50ebc85d90d3fdf2e8ead.exe"C:\Users\Admin\AppData\Local\Temp\3eab7a22cef50ebc85d90d3fdf2e8ead.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 2242⤵
- Program crash
PID:5032
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat2⤵PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4492 -ip 44921⤵PID:3512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1204 -s 2161⤵
- Program crash
PID:2864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1204 -ip 12041⤵PID:3860
-
C:\Windows\SysWOW64\help.comC:\Windows\SysWOW64\help.com1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1204