Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 10:02
Static task
static1
Behavioral task
behavioral1
Sample
409021962f521632561d4cb8b5ff2a1a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
409021962f521632561d4cb8b5ff2a1a.exe
Resource
win10v2004-20231215-en
General
-
Target
409021962f521632561d4cb8b5ff2a1a.exe
-
Size
2.9MB
-
MD5
409021962f521632561d4cb8b5ff2a1a
-
SHA1
1ce4ef8554a104087c4c70ec9946e0156f7f6fda
-
SHA256
c8f5eb62c605962a4705a52a75280589a8b26952613ad093289036b2ed404627
-
SHA512
380cd71d27a17bb237841afc2f3d7ca6d87658b8a778f2d2b595910b79ad3268e51b0000493be9d4dc79fef5bd2902a3e95982d6a194d006c487171bd70ebc29
-
SSDEEP
24576:gRmJkcoQricOIQxiZY1iamoEZ3dMo2+6mTY4E4yKTiFWH+zuwfsUNXzpdenr/gT4:VJZoQrbTFZY1iamf
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
409021962f521632561d4cb8b5ff2a1a.exedescription pid process target process PID 4264 set thread context of 2204 4264 409021962f521632561d4cb8b5ff2a1a.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process 3588 2204 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
409021962f521632561d4cb8b5ff2a1a.exepid process 4264 409021962f521632561d4cb8b5ff2a1a.exe 4264 409021962f521632561d4cb8b5ff2a1a.exe 4264 409021962f521632561d4cb8b5ff2a1a.exe 4264 409021962f521632561d4cb8b5ff2a1a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
409021962f521632561d4cb8b5ff2a1a.exedescription pid process target process PID 4264 wrote to memory of 2204 4264 409021962f521632561d4cb8b5ff2a1a.exe RegSvcs.exe PID 4264 wrote to memory of 2204 4264 409021962f521632561d4cb8b5ff2a1a.exe RegSvcs.exe PID 4264 wrote to memory of 2204 4264 409021962f521632561d4cb8b5ff2a1a.exe RegSvcs.exe PID 4264 wrote to memory of 2204 4264 409021962f521632561d4cb8b5ff2a1a.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\409021962f521632561d4cb8b5ff2a1a.exe"C:\Users\Admin\AppData\Local\Temp\409021962f521632561d4cb8b5ff2a1a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵PID:2204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2204 -ip 22041⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 801⤵
- Program crash
PID:3588