Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 07:05
Static task
static1
Behavioral task
behavioral1
Sample
403599026e72e68aceab3d573c82c8bc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
403599026e72e68aceab3d573c82c8bc.exe
Resource
win10v2004-20231215-en
General
-
Target
403599026e72e68aceab3d573c82c8bc.exe
-
Size
61KB
-
MD5
403599026e72e68aceab3d573c82c8bc
-
SHA1
571b7ecb2b805ff4f5096183a5f79f101ff982ce
-
SHA256
454684e77418be0de8c2dc5080b703e5a3ee08252523b17f125f86669e3c541a
-
SHA512
287cacf3fd319b8b5323a9cf34b165982058df34c3b8da58c77a37189097206463958ba13e48cf88e3cde28964b2247499900c23cdd4fe113cf7b50cf0fe5504
-
SSDEEP
1536:jQ3UNB1up06ksNowiRY3/WE7RNJuZxb66JIj7m/4p:jQ62p0DWoXW3/WE7Md66JIXm/4p
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1160 loader.exe 2828 search.exe 2036 vobohudo.exe -
Loads dropped DLL 10 IoCs
pid Process 808 403599026e72e68aceab3d573c82c8bc.exe 808 403599026e72e68aceab3d573c82c8bc.exe 808 403599026e72e68aceab3d573c82c8bc.exe 808 403599026e72e68aceab3d573c82c8bc.exe 2716 WerFault.exe 2716 WerFault.exe 2716 WerFault.exe 2716 WerFault.exe 2828 search.exe 2828 search.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2716 1160 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2828 search.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 808 wrote to memory of 1160 808 403599026e72e68aceab3d573c82c8bc.exe 28 PID 808 wrote to memory of 1160 808 403599026e72e68aceab3d573c82c8bc.exe 28 PID 808 wrote to memory of 1160 808 403599026e72e68aceab3d573c82c8bc.exe 28 PID 808 wrote to memory of 1160 808 403599026e72e68aceab3d573c82c8bc.exe 28 PID 808 wrote to memory of 2828 808 403599026e72e68aceab3d573c82c8bc.exe 30 PID 808 wrote to memory of 2828 808 403599026e72e68aceab3d573c82c8bc.exe 30 PID 808 wrote to memory of 2828 808 403599026e72e68aceab3d573c82c8bc.exe 30 PID 808 wrote to memory of 2828 808 403599026e72e68aceab3d573c82c8bc.exe 30 PID 1160 wrote to memory of 2716 1160 loader.exe 29 PID 1160 wrote to memory of 2716 1160 loader.exe 29 PID 1160 wrote to memory of 2716 1160 loader.exe 29 PID 1160 wrote to memory of 2716 1160 loader.exe 29 PID 2828 wrote to memory of 2036 2828 search.exe 35 PID 2828 wrote to memory of 2036 2828 search.exe 35 PID 2828 wrote to memory of 2036 2828 search.exe 35 PID 2828 wrote to memory of 2036 2828 search.exe 35 PID 2828 wrote to memory of 2232 2828 search.exe 36 PID 2828 wrote to memory of 2232 2828 search.exe 36 PID 2828 wrote to memory of 2232 2828 search.exe 36 PID 2828 wrote to memory of 2232 2828 search.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\403599026e72e68aceab3d573c82c8bc.exe"C:\Users\Admin\AppData\Local\Temp\403599026e72e68aceab3d573c82c8bc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 363⤵
- Loads dropped DLL
- Program crash
PID:2716
-
-
-
C:\Users\Admin\AppData\Local\Temp\search.exe"C:\Users\Admin\AppData\Local\Temp\search.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\ProgramData\fghsbobc\vobohudo.exeC:\ProgramData\fghsbobc\vobohudo.exe3⤵
- Executes dropped EXE
PID:2036
-
-
C:\Windows\SysWOW64\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\search.exe.bak >> NUL3⤵PID:2232
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD50ecd7860a2a53a0865ea11558315e3ce
SHA17a70573abfea1a31beb822478c2dac0932799b48
SHA2568b8ab33cbb963aaf6eca78d50fd2b84b62a2a9ede8c5acd007bca7c85c8aade2
SHA5127b52dd18d1b9b107bfdaab116ed752abc675ff63f63991cfa0cfa0db04238afbddc18b8acfbddf5f072a89d9e0a0d51c94fb5818a1755a42a113284e0af30a57
-
Filesize
72KB
MD57c96e667e91592ec3ca1fb457480ac12
SHA1dad4a17691cb8b57e05e7a06fe396809737606d6
SHA256256e84c0463d5e40d5a4bbeadeab7b785089100a5ab02203c0668a8cb142ef5f
SHA512cc7644eb668d03ca6b68d5dceb8bf74edf08b5c53258b4b67898c36b8764e94b421bb37f4126e3355435b691063d4d59029666472e66423b5bd727105e399eab