Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
59fa728668cadc67f6c031e08cf7d203.exe
Resource
win7-20231215-en
General
-
Target
59fa728668cadc67f6c031e08cf7d203.exe
-
Size
193KB
-
MD5
59fa728668cadc67f6c031e08cf7d203
-
SHA1
6fe6f0f77504d02560e2ce3cea79e01dc8dc1c8e
-
SHA256
679a4974ab63899ed62e52788c391369675a904adc969c93d4ec274dada141d2
-
SHA512
9e273dc3707de2a13e58d78bb6f5694493886f88ffc1a5893fd7290be509be56439cd8d31c247d7bf72ad9a2f650af4dca84d5eaf175687572b347a3e967318b
-
SSDEEP
3072:pR2xn3k0CdM1vabyzJYWqSSpbaxhptgiHaKruj3A3dS5DFZSHZFD:pR2J0LS6VTI/fjaHQ31V
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2296 59fa728668cadc67f6c031e08cf7d203mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 112 59fa728668cadc67f6c031e08cf7d203.exe 112 59fa728668cadc67f6c031e08cf7d203.exe 2104 WerFault.exe 2104 WerFault.exe 2104 WerFault.exe 2104 WerFault.exe 2104 WerFault.exe 2104 WerFault.exe 2104 WerFault.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2484 112 WerFault.exe 20 2104 2296 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 112 wrote to memory of 2296 112 59fa728668cadc67f6c031e08cf7d203.exe 28 PID 112 wrote to memory of 2296 112 59fa728668cadc67f6c031e08cf7d203.exe 28 PID 112 wrote to memory of 2296 112 59fa728668cadc67f6c031e08cf7d203.exe 28 PID 112 wrote to memory of 2296 112 59fa728668cadc67f6c031e08cf7d203.exe 28 PID 112 wrote to memory of 2484 112 59fa728668cadc67f6c031e08cf7d203.exe 29 PID 112 wrote to memory of 2484 112 59fa728668cadc67f6c031e08cf7d203.exe 29 PID 112 wrote to memory of 2484 112 59fa728668cadc67f6c031e08cf7d203.exe 29 PID 112 wrote to memory of 2484 112 59fa728668cadc67f6c031e08cf7d203.exe 29 PID 2296 wrote to memory of 2104 2296 59fa728668cadc67f6c031e08cf7d203mgr.exe 30 PID 2296 wrote to memory of 2104 2296 59fa728668cadc67f6c031e08cf7d203mgr.exe 30 PID 2296 wrote to memory of 2104 2296 59fa728668cadc67f6c031e08cf7d203mgr.exe 30 PID 2296 wrote to memory of 2104 2296 59fa728668cadc67f6c031e08cf7d203mgr.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\59fa728668cadc67f6c031e08cf7d203.exe"C:\Users\Admin\AppData\Local\Temp\59fa728668cadc67f6c031e08cf7d203.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\59fa728668cadc67f6c031e08cf7d203mgr.exeC:\Users\Admin\AppData\Local\Temp\59fa728668cadc67f6c031e08cf7d203mgr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 1563⤵
- Loads dropped DLL
- Program crash
PID:2104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 112 -s 1522⤵
- Program crash
PID:2484
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5f8a6e7529ad1b00a18c6ca2702521471
SHA12cadb00ca99be622623dc78095f594bedfec7534
SHA256ce8e07cec9c3857f48e20916c65413335ab480b0c3d70345e98147b2ff7b8de6
SHA512e1c3f164aa58360e4b664341ddea907fe990fa93de6f1e98b4fe87bf713e62b50191d738afc5591ead628f6f58dead74d78d26267ac03079f96bcb85b93ce2f7