Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
4132d1c59a48284e25e666e8718ca9a9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4132d1c59a48284e25e666e8718ca9a9.exe
Resource
win10v2004-20231215-en
General
-
Target
4132d1c59a48284e25e666e8718ca9a9.exe
-
Size
103KB
-
MD5
4132d1c59a48284e25e666e8718ca9a9
-
SHA1
018f00cae92e37ab684442b6358a0c185166f313
-
SHA256
be19e6e9879e56692d00ca3127c182c67285d8ceccfcd82fa372764831d61725
-
SHA512
cd24bcf7f01e27396b666b0eabd52830f968fcf7626478f0a3501bf8aecdb35ab146d06bbede5fe9042b0bfb093fd3bfb891817dbd8327afe0074d75dcd2f9b2
-
SSDEEP
1536:5ZS8H/GZJ402wL7iHwMdnE4tmJYLdIC4d21M0XTpObU1VnzIDhwkssLzdFGVv20Y:58D40rL2DnVmJEId+Xt/1VUd3xuLEDaO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2084 matrix313311.exe -
Loads dropped DLL 8 IoCs
pid Process 2228 4132d1c59a48284e25e666e8718ca9a9.exe 2228 4132d1c59a48284e25e666e8718ca9a9.exe 2084 matrix313311.exe 2084 matrix313311.exe 2084 matrix313311.exe 2740 WerFault.exe 2740 WerFault.exe 2740 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2740 2084 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2084 2228 4132d1c59a48284e25e666e8718ca9a9.exe 28 PID 2228 wrote to memory of 2084 2228 4132d1c59a48284e25e666e8718ca9a9.exe 28 PID 2228 wrote to memory of 2084 2228 4132d1c59a48284e25e666e8718ca9a9.exe 28 PID 2228 wrote to memory of 2084 2228 4132d1c59a48284e25e666e8718ca9a9.exe 28 PID 2228 wrote to memory of 2084 2228 4132d1c59a48284e25e666e8718ca9a9.exe 28 PID 2228 wrote to memory of 2084 2228 4132d1c59a48284e25e666e8718ca9a9.exe 28 PID 2228 wrote to memory of 2084 2228 4132d1c59a48284e25e666e8718ca9a9.exe 28 PID 2084 wrote to memory of 2740 2084 matrix313311.exe 29 PID 2084 wrote to memory of 2740 2084 matrix313311.exe 29 PID 2084 wrote to memory of 2740 2084 matrix313311.exe 29 PID 2084 wrote to memory of 2740 2084 matrix313311.exe 29 PID 2084 wrote to memory of 2740 2084 matrix313311.exe 29 PID 2084 wrote to memory of 2740 2084 matrix313311.exe 29 PID 2084 wrote to memory of 2740 2084 matrix313311.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4132d1c59a48284e25e666e8718ca9a9.exe"C:\Users\Admin\AppData\Local\Temp\4132d1c59a48284e25e666e8718ca9a9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\matrix313311.exeC:\Users\Admin\AppData\Local\Temp\matrix313311.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 2563⤵
- Loads dropped DLL
- Program crash
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD561c5e6f17dcde21fa42219fe5fd33dfe
SHA1c852848cb706ee8943e24c60dc1cb4d41350d234
SHA25699089746a0dab8ac0f41f5cd50112acfd869b1ba966f1cee398790109c6a6624
SHA512a31f85c47020d655aef0bcb1df0c55133c477c77c6c01db15faed6b2c5722dee5aed874fd4c5f527929e6c01978532d92503ecfd94029c6791314e531be9fd0e