Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
6440abdb529c401f5bda914359e76b12.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6440abdb529c401f5bda914359e76b12.exe
Resource
win10v2004-20231215-en
General
-
Target
6440abdb529c401f5bda914359e76b12.exe
-
Size
160KB
-
MD5
6440abdb529c401f5bda914359e76b12
-
SHA1
c68b838ad422a33c129ebb5dc01f81d1b4b09ada
-
SHA256
c926db383d7481891952b75a532b25f492f7f02c26cdecc9b46f5a13e3ae650d
-
SHA512
a8c870067779f5a73b9c9c9c1533257df3a6cf4db6e79f1a5585ccb2e366248b234eb26c228ef04162fb0011f611ea63bec28f320a5d73768d2523c3ff66f56f
-
SSDEEP
3072:6NI5vxsI6b1zCzeTDmMSyi70ZywVea4yal1dBmLN/wo85uCSgF16PZN:6W5vx5UEenw70lVeZl1dBmLN4pnSgF4B
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2804 6440abdb529c401f5bda914359e76b12.exe 2804 6440abdb529c401f5bda914359e76b12.exe 2572 WerFault.exe -
resource yara_rule behavioral1/memory/2804-8-0x0000000000270000-0x00000000002A8000-memory.dmp upx behavioral1/memory/2804-7-0x0000000000270000-0x00000000002A8000-memory.dmp upx behavioral1/memory/2804-14-0x0000000000270000-0x00000000002A8000-memory.dmp upx behavioral1/memory/2804-22-0x00000000002D0000-0x00000000002EC000-memory.dmp upx behavioral1/memory/2804-23-0x00000000002D0000-0x00000000002EC000-memory.dmp upx behavioral1/memory/2804-42-0x00000000002D0000-0x00000000002EC000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{829BC664-C805-49A9-8FE6-52C47E40AB1C} 6440abdb529c401f5bda914359e76b12.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2572 2804 WerFault.exe 27 -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{829BC664-C805-49A9-8FE6-52C47E40AB1C}\InprocServer32 6440abdb529c401f5bda914359e76b12.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 6440abdb529c401f5bda914359e76b12.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 6440abdb529c401f5bda914359e76b12.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{829BC664-C805-49A9-8FE6-52C47E40AB1C} 6440abdb529c401f5bda914359e76b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{829BC664-C805-49A9-8FE6-52C47E40AB1C}\InprocServer32\ = "C:\\Windows\\SysWow64\\at.dll" 6440abdb529c401f5bda914359e76b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{829BC664-C805-49A9-8FE6-52C47E40AB1C}\InprocServer32\ThreadingModel = "apartment" 6440abdb529c401f5bda914359e76b12.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2804 6440abdb529c401f5bda914359e76b12.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2572 2804 6440abdb529c401f5bda914359e76b12.exe 29 PID 2804 wrote to memory of 2572 2804 6440abdb529c401f5bda914359e76b12.exe 29 PID 2804 wrote to memory of 2572 2804 6440abdb529c401f5bda914359e76b12.exe 29 PID 2804 wrote to memory of 2572 2804 6440abdb529c401f5bda914359e76b12.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6440abdb529c401f5bda914359e76b12.exe"C:\Users\Admin\AppData\Local\Temp\6440abdb529c401f5bda914359e76b12.exe"1⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 2162⤵
- Loads dropped DLL
- Program crash
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5e85b520e14dd58068e8e0b533bfe995a
SHA133afae7ee2d7e19bbf3a02f1dce7d3f6bc7eb690
SHA25625299c86686a45b68f8cac7bee1cabef32c30f86120a6ef41ee177ee0d094891
SHA512301326a172371e682b39ee0292baed2348509096a1def7c099ee38e8717e0e7ca4754cf376266f5de7a3e7da737109bb22c04e6eba30109fed1bacfd4f660cab
-
Filesize
51KB
MD516576a5be02d9e2a27afbd376b897102
SHA15fde6ee9d370ca9016b2f43aee2a4e79733cbe90
SHA2567424fe4ea691fa16da8970e522c7b2d59ec70e6f6831763ce69cddb2e96a6fa4
SHA512ec618d8e722e3f1509e9a9ef858659fae6a9e607ddf7a8b0c80f1096429c09fe1f47e93efd3d612a03907eb498402667f5d21458f105756552a609d3ed0f3a3a
-
Filesize
1KB
MD50dce4c2d761253d932c05f883cca5ada
SHA1314ac8756a7d5af07feca77229a05f757f4ac0e0
SHA256cfae1adc9c30da4a36011974bf78b689ed40b4dc59d75e66d7efc9e72fcf9ddd
SHA512c7088eae327b4d95082c2ca7433c9638969047471d1d82ae0c8252556a05d51f3905433f428b9a643cc773a3a2c1693f1242477e5888befe7a3f0d426cf48b7a