Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
68675b25fc8578ac2343eaeef553738f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
68675b25fc8578ac2343eaeef553738f.exe
Resource
win10v2004-20231215-en
General
-
Target
68675b25fc8578ac2343eaeef553738f.exe
-
Size
2.7MB
-
MD5
68675b25fc8578ac2343eaeef553738f
-
SHA1
a84b27d78d47d10a66d9c542c7f878dee117c951
-
SHA256
33c8e9d960d664a8c7059012f28ae668f4c31fdd0d8e930f22098e7045015d8a
-
SHA512
91fa016790089fa49cde0df5730553cebf99587a0b46a50f9538284b0b06f97e2d0275e67444913d7467871c9101c6d7422fcb508eafa0010f2d3792296fb053
-
SSDEEP
49152:t+axysYC6syUkoPaPS2AJNyxUP+Mkt3ZlPl9Ggj2J3Y2peIu0XSkRDv0N:ytClVkoOSfJNAUW93ZlPP2Jo2wUXSaDv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2396 Updater.exe -
Executes dropped EXE 1 IoCs
pid Process 2396 Updater.exe -
Loads dropped DLL 6 IoCs
pid Process 2196 68675b25fc8578ac2343eaeef553738f.exe 2744 WerFault.exe 2744 WerFault.exe 2744 WerFault.exe 2744 WerFault.exe 2744 WerFault.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2744 2396 WerFault.exe 29 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2396 Updater.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2396 2196 68675b25fc8578ac2343eaeef553738f.exe 29 PID 2196 wrote to memory of 2396 2196 68675b25fc8578ac2343eaeef553738f.exe 29 PID 2196 wrote to memory of 2396 2196 68675b25fc8578ac2343eaeef553738f.exe 29 PID 2196 wrote to memory of 2396 2196 68675b25fc8578ac2343eaeef553738f.exe 29 PID 2196 wrote to memory of 2396 2196 68675b25fc8578ac2343eaeef553738f.exe 29 PID 2196 wrote to memory of 2396 2196 68675b25fc8578ac2343eaeef553738f.exe 29 PID 2196 wrote to memory of 2396 2196 68675b25fc8578ac2343eaeef553738f.exe 29 PID 2396 wrote to memory of 2744 2396 Updater.exe 31 PID 2396 wrote to memory of 2744 2396 Updater.exe 31 PID 2396 wrote to memory of 2744 2396 Updater.exe 31 PID 2396 wrote to memory of 2744 2396 Updater.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\68675b25fc8578ac2343eaeef553738f.exe"C:\Users\Admin\AppData\Local\Temp\68675b25fc8578ac2343eaeef553738f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Roaming\Update\Updater.exe"C:\Users\Admin\AppData\Roaming\Update\Updater.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 12043⤵
- Loads dropped DLL
- Program crash
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
640KB
MD5ac57259a517b2ccab6e535602b124595
SHA1405e75a6fb96844218e852b43911ed859736c611
SHA256639e024c31063178983d079e92064ea11479b78a6d34e339f9f1173ba31bba84
SHA512c67642cef1287dcb7200bb389f6ddb11e193185613a0664622466508266eb12a75528738c9970889596c4ad3ac08bbab6c678e326594885d6823fe0673f15629
-
Filesize
2.7MB
MD568675b25fc8578ac2343eaeef553738f
SHA1a84b27d78d47d10a66d9c542c7f878dee117c951
SHA25633c8e9d960d664a8c7059012f28ae668f4c31fdd0d8e930f22098e7045015d8a
SHA51291fa016790089fa49cde0df5730553cebf99587a0b46a50f9538284b0b06f97e2d0275e67444913d7467871c9101c6d7422fcb508eafa0010f2d3792296fb053
-
Filesize
6B
MD520d4ae0d4dc245fb9c50435f5aa5c8b0
SHA1fe5ea185e09dd5edd998370add9c9ba9d1840919
SHA256b043306e62b8d39723c6d1dc4ba65cafb892030ed8aa4d833742d5890c5b5f5a
SHA5125437e42ea616b1f6fc409cd55a8619b2f6618d5fbfd5466743a63050851d827bc95687028fd3b275a510937d6c6af24726789fd0145683ab6722a2a0d11066ce
-
Filesize
832KB
MD5899839a8473b5998f1f47802151463cf
SHA14992586a36a4a64139076fd7b34fe830ea426d22
SHA256195bc32b744a7cf53b51102a75421890f94184696c32d09357d589e91b2d558e
SHA512a7105a58ee82f6457f4bd30fa2ffdd8afb2be8d425fb4ffd20ece5bb4c57c21bda673e26b63fa3fc79cbb9b75082072d048cddf02dc726e4d33458dc30ed5770