Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 07:42
Static task
static1
Behavioral task
behavioral1
Sample
6710471fae73afc0117693af548f73d3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6710471fae73afc0117693af548f73d3.exe
Resource
win10v2004-20231215-en
General
-
Target
6710471fae73afc0117693af548f73d3.exe
-
Size
295KB
-
MD5
6710471fae73afc0117693af548f73d3
-
SHA1
f6ec258629cdb419d757ae6ac9b5f201afb63f83
-
SHA256
9240bc981d7b180f9237184bf5f61a6b441447ebd74fd58519f8e1babee46438
-
SHA512
6a3efbe366bf1a4d0688b08166bdd88e6efea632522d32b8333e899b0ace6c6b879d0137cfe18e91046bf9182d790bc235df15e6d8b0290d20913696ce210318
-
SSDEEP
6144:YqALKMtci5TKWKqhZmBzFBi1AKL+f7JtHPBy3ni2/3KgllZ:Yq/nW4BhBQAKCZyXi2ygl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3844 temp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3844 set thread context of 3608 3844 temp.exe 90 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Delete.bat 6710471fae73afc0117693af548f73d3.exe File created C:\Windows\temp.exe 6710471fae73afc0117693af548f73d3.exe File opened for modification C:\Windows\temp.exe 6710471fae73afc0117693af548f73d3.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4044 3608 WerFault.exe 90 -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3608 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3844 wrote to memory of 3608 3844 temp.exe 90 PID 3844 wrote to memory of 3608 3844 temp.exe 90 PID 3844 wrote to memory of 3608 3844 temp.exe 90 PID 3844 wrote to memory of 3608 3844 temp.exe 90 PID 3084 wrote to memory of 1696 3084 6710471fae73afc0117693af548f73d3.exe 91 PID 3084 wrote to memory of 1696 3084 6710471fae73afc0117693af548f73d3.exe 91 PID 3084 wrote to memory of 1696 3084 6710471fae73afc0117693af548f73d3.exe 91 PID 3844 wrote to memory of 3608 3844 temp.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\6710471fae73afc0117693af548f73d3.exe"C:\Users\Admin\AppData\Local\Temp\6710471fae73afc0117693af548f73d3.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Delete.bat2⤵PID:1696
-
-
C:\Windows\temp.exeC:\Windows\temp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\WINDOWS\SysWOW64\svchost.exeC:\WINDOWS\system32\svchost.exe2⤵
- Suspicious use of UnmapMainImage
PID:3608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3608 -s 123⤵
- Program crash
PID:4044
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3608 -ip 36081⤵PID:1732
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186B
MD5bd3d6e08168bc914c289033d043b1ad9
SHA136de067d156278ba2d2368e4ac1580b7ea21c1fd
SHA256ebcd11e8b7da5bada5995ccebe5056f0d7bfc3e6ef2e860228521e6889e29950
SHA512879ae0f83749505085b7c1bea4c9fa0bfcda92c0abec45e74084490efeb2000f3f66e856daf88cc710b76653b30c82f6ee09e089b606391259cf1e637ff10f46
-
Filesize
295KB
MD56710471fae73afc0117693af548f73d3
SHA1f6ec258629cdb419d757ae6ac9b5f201afb63f83
SHA2569240bc981d7b180f9237184bf5f61a6b441447ebd74fd58519f8e1babee46438
SHA5126a3efbe366bf1a4d0688b08166bdd88e6efea632522d32b8333e899b0ace6c6b879d0137cfe18e91046bf9182d790bc235df15e6d8b0290d20913696ce210318