Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15-01-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
5c3be5dd59684b11ee2b879c8d949898.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5c3be5dd59684b11ee2b879c8d949898.exe
Resource
win10v2004-20231215-en
General
-
Target
5c3be5dd59684b11ee2b879c8d949898.exe
-
Size
3.4MB
-
MD5
5c3be5dd59684b11ee2b879c8d949898
-
SHA1
7841daa18d7f00ddea7e50c8dd1e5485cea12051
-
SHA256
3f4b4b11b72e1293ca354173546e07402962269a2b95f2097b2a9cca7eeb5d97
-
SHA512
d5b0a79f84b25b7345b3437ba821b224699d585c391c3834d01de92bfd283f0b60ca8d330923e2c33c10f9f8cd39ba6d7a49d68bae550031c198f80d60916a2f
-
SSDEEP
98304:da56u8mVi1owAwdyVjafKQBEyeqZmWsH:dtdmFwAw+jmCydLsH
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nwA5rK90TfrmYp.exe 5c3be5dd59684b11ee2b879c8d949898.exe -
Executes dropped EXE 2 IoCs
pid Process 3012 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe -
Loads dropped DLL 3 IoCs
pid Process 2912 5c3be5dd59684b11ee2b879c8d949898.exe 2912 5c3be5dd59684b11ee2b879c8d949898.exe 3012 nwA5rK90TfrmYp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2812 1168 WerFault.exe 32 -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2664 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe 2664 nwA5rK90TfrmYp.exe 1168 cmd.exe 1168 cmd.exe 1168 cmd.exe 1168 cmd.exe 1168 cmd.exe 1168 cmd.exe 1168 cmd.exe 1168 cmd.exe 1168 cmd.exe 1168 cmd.exe 1168 cmd.exe 1168 cmd.exe 1168 cmd.exe 1168 cmd.exe 1168 cmd.exe 1168 cmd.exe 1168 cmd.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2912 2784 5c3be5dd59684b11ee2b879c8d949898.exe 28 PID 2784 wrote to memory of 2912 2784 5c3be5dd59684b11ee2b879c8d949898.exe 28 PID 2784 wrote to memory of 2912 2784 5c3be5dd59684b11ee2b879c8d949898.exe 28 PID 2784 wrote to memory of 2912 2784 5c3be5dd59684b11ee2b879c8d949898.exe 28 PID 2912 wrote to memory of 3012 2912 5c3be5dd59684b11ee2b879c8d949898.exe 30 PID 2912 wrote to memory of 3012 2912 5c3be5dd59684b11ee2b879c8d949898.exe 30 PID 2912 wrote to memory of 3012 2912 5c3be5dd59684b11ee2b879c8d949898.exe 30 PID 2912 wrote to memory of 3012 2912 5c3be5dd59684b11ee2b879c8d949898.exe 30 PID 3012 wrote to memory of 2664 3012 nwA5rK90TfrmYp.exe 31 PID 3012 wrote to memory of 2664 3012 nwA5rK90TfrmYp.exe 31 PID 3012 wrote to memory of 2664 3012 nwA5rK90TfrmYp.exe 31 PID 3012 wrote to memory of 2664 3012 nwA5rK90TfrmYp.exe 31 PID 2664 wrote to memory of 1168 2664 nwA5rK90TfrmYp.exe 32 PID 2664 wrote to memory of 1168 2664 nwA5rK90TfrmYp.exe 32 PID 2664 wrote to memory of 1168 2664 nwA5rK90TfrmYp.exe 32 PID 2664 wrote to memory of 1168 2664 nwA5rK90TfrmYp.exe 32 PID 2664 wrote to memory of 1168 2664 nwA5rK90TfrmYp.exe 32 PID 2664 wrote to memory of 1168 2664 nwA5rK90TfrmYp.exe 32 PID 1168 wrote to memory of 2812 1168 cmd.exe 34 PID 1168 wrote to memory of 2812 1168 cmd.exe 34 PID 1168 wrote to memory of 2812 1168 cmd.exe 34 PID 1168 wrote to memory of 2812 1168 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c3be5dd59684b11ee2b879c8d949898.exe"C:\Users\Admin\AppData\Local\Temp\5c3be5dd59684b11ee2b879c8d949898.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\5c3be5dd59684b11ee2b879c8d949898.exe"C:\Users\Admin\AppData\Local\Temp\5c3be5dd59684b11ee2b879c8d949898.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nwA5rK90TfrmYp.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nwA5rK90TfrmYp.exe" "C:\Users\Admin\AppData\Local\Temp\5c3be5dd59684b11ee2b879c8d949898.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nwA5rK90TfrmYp.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nwA5rK90TfrmYp.exe" "C:\Users\Admin\AppData\Local\Temp\5c3be5dd59684b11ee2b879c8d949898.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 3646⤵
- Program crash
PID:2812
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5e55daf00cc16966207064e22678c0230
SHA15a945d5259a5490c2400594cffa00d9d5a7da44e
SHA25615ea340255862b7591f5b4a508935f08348bd3199b5243d264f36c00395ef32f
SHA5126685eee40e96063e44c3cb460e5362cc6064c1fe5abec86f14a12387b129804376a8522883e8ff72f57d96c1bafb656fc3ec8f9e01b1eae8ee495ec51096cb3a
-
Filesize
2.7MB
MD5bfc781c5b6c0f840ff56410ac73b670d
SHA16742cd2807068b417e64f54100d7ac967792d4be
SHA25651cb28dc2295078869cc9d1b8ac044541589a035dbfcf9bc89f7faa1ffde706f
SHA51253f2d226494234f739f50dd0e41977ad99d47f02297d2a946beab6da84ddf7eaa5a9eb9350d25cbb4ac9de0c6f1e558940ed0cd9f98a40f836fc24e5a98e08e1
-
Filesize
2.7MB
MD5f7105f8d55ed02e2de227ca316e5341d
SHA160d668a199b18e47fbc4833f5372831ab39223dd
SHA2567c9abca84707749e1145eee926c279ee529687aee1c7ac9fa43d65270d153138
SHA5122da337bb1f1cbf10c6e49f638ea5a449819cd9ac15cb47bed38abf985891e2f026bb308d171ab4c5b1df493eb736b2b829a55189917ae396ea2d99a5ded9119e
-
Filesize
2.3MB
MD53a97dd355e8c2528384019ccf52a09da
SHA13f6d5979e3ef1f9df43b3fb3f397d6500ef3ab6e
SHA256a3a541c360f85df36911c1e86ce5dfc42f3b186f1c76d09220f218155c203737
SHA51288f8a61414a9651987a846c09cae2da95368b67e8acb902564ed8c5af3a9f7c27937a9368d28cc5c347a7879c073641e9cf87e5402e81f842f6d848c9ca29c20
-
Filesize
3.4MB
MD50a2494847198e0b968a0cd9a3340d193
SHA19cc4c48c6bec8e2dbe406712d3f1072388c952ff
SHA256be82dfb1ca4028ebf80d9c268343c7e3d0c9be3c4a7ab9e93a108f76451d9e56
SHA512ea1de8e966cbaba7bd8162eb78aaeaf11b79c65fe0c133e3492da56e1ac6b904faae20a57f85aca31ea84306cde428849abb359cb1215cec4e949dd758fa6824