Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 12:02
Static task
static1
Behavioral task
behavioral1
Sample
6551041809c22dd6d0cb0ffbf4a68ab8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6551041809c22dd6d0cb0ffbf4a68ab8.exe
Resource
win10v2004-20231215-en
General
-
Target
6551041809c22dd6d0cb0ffbf4a68ab8.exe
-
Size
695KB
-
MD5
6551041809c22dd6d0cb0ffbf4a68ab8
-
SHA1
e64b8a5b2828c892938ecf05df445218eba37f42
-
SHA256
2980e4ce8783e25aad73add6723519b845a524158d1d6be1ef78cf15b88d3760
-
SHA512
dd14a3a64119a8538affa638d66330ab43e6536f5c5f64e7ad75c4d71057b2f9df6dfde180e1dd34b727d36ac67a0910fcc1cb4686c9003eaf657f6188498f60
-
SSDEEP
12288:DC0NZyZL3/BRPTIWPoHwKtJNhPVG/PYb7U8tF3Z4mxxXoEtlK+kt9T2Mb:ryZ3p5XFWNhPQob7U8tQmX4Gq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2680 rejoice45.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice45.exe rejoice45.exe File opened for modification C:\Windows\SysWOW64\_rejoice45.exe rejoice45.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice45.exe 6551041809c22dd6d0cb0ffbf4a68ab8.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice45.exe 6551041809c22dd6d0cb0ffbf4a68ab8.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat 6551041809c22dd6d0cb0ffbf4a68ab8.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3092 3228 WerFault.exe 84 5036 2680 WerFault.exe 91 3224 2680 WerFault.exe 91 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3228 wrote to memory of 2680 3228 6551041809c22dd6d0cb0ffbf4a68ab8.exe 91 PID 3228 wrote to memory of 2680 3228 6551041809c22dd6d0cb0ffbf4a68ab8.exe 91 PID 3228 wrote to memory of 2680 3228 6551041809c22dd6d0cb0ffbf4a68ab8.exe 91 PID 2680 wrote to memory of 1576 2680 rejoice45.exe 94 PID 2680 wrote to memory of 1576 2680 rejoice45.exe 94 PID 2680 wrote to memory of 1576 2680 rejoice45.exe 94 PID 3228 wrote to memory of 4280 3228 6551041809c22dd6d0cb0ffbf4a68ab8.exe 97 PID 3228 wrote to memory of 4280 3228 6551041809c22dd6d0cb0ffbf4a68ab8.exe 97 PID 3228 wrote to memory of 4280 3228 6551041809c22dd6d0cb0ffbf4a68ab8.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\6551041809c22dd6d0cb0ffbf4a68ab8.exe"C:\Users\Admin\AppData\Local\Temp\6551041809c22dd6d0cb0ffbf4a68ab8.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 3242⤵
- Program crash
PID:3092
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice45.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice45.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 3243⤵
- Program crash
PID:5036
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 6923⤵
- Program crash
PID:3224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat""2⤵PID:4280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3228 -ip 32281⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2680 -ip 26801⤵PID:2420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2680 -ip 26801⤵PID:2164
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD58a4d19b69d10ddb2f979af22e3667736
SHA11ccc413e2cf30c43b594ddaedeea68db690e9051
SHA256d94f93dbe161ff2c72058ffe7834623c2777e9df0caa1960ac335a0d203132ed
SHA5122e45134c6c92baa3288823b44a2f2288770f2f5d218981bba54e2baeca336785cb0f6a816fa8555d33c906b090570b6cc133a0625c2a3065eb1f13b926fea42d
-
Filesize
695KB
MD56551041809c22dd6d0cb0ffbf4a68ab8
SHA1e64b8a5b2828c892938ecf05df445218eba37f42
SHA2562980e4ce8783e25aad73add6723519b845a524158d1d6be1ef78cf15b88d3760
SHA512dd14a3a64119a8538affa638d66330ab43e6536f5c5f64e7ad75c4d71057b2f9df6dfde180e1dd34b727d36ac67a0910fcc1cb4686c9003eaf657f6188498f60