Analysis
-
max time kernel
91s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 15:10
Behavioral task
behavioral1
Sample
6fc06502b6260a1cc79ce3694928bd75.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6fc06502b6260a1cc79ce3694928bd75.exe
Resource
win10v2004-20231215-en
General
-
Target
6fc06502b6260a1cc79ce3694928bd75.exe
-
Size
807KB
-
MD5
6fc06502b6260a1cc79ce3694928bd75
-
SHA1
9f93a8de843787692ec39ab1dfc2be062214b09a
-
SHA256
24b42a920a1b1aa3e6738d2cc759f92670399fc93af253defb0cff733e0d7943
-
SHA512
566f82bb247b8a3106c6ecaf37f159104b4fc00ac9797fd8e2e2f55b27cdb29b78878fd46402dcd1bc6a2aadb5724a1f0d16a400ded77e7af38c99ff69b0bec3
-
SSDEEP
24576:SQC/Ac7vlzePJJ92Mi2vI5BIXSTitrnBVTv/YiN1DesGWKi:SQC/rgPlNvI5+1rnB9/YiNxeA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3436 setup.exe -
resource yara_rule behavioral2/memory/3540-0-0x0000000000410000-0x000000000066F000-memory.dmp upx behavioral2/files/0x0006000000023233-3.dat upx behavioral2/memory/3436-6-0x0000000000200000-0x000000000045F000-memory.dmp upx behavioral2/memory/3540-5-0x0000000000410000-0x000000000066F000-memory.dmp upx behavioral2/memory/3436-7-0x0000000000200000-0x000000000045F000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2960 3436 WerFault.exe 85 -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3540 6fc06502b6260a1cc79ce3694928bd75.exe 3540 6fc06502b6260a1cc79ce3694928bd75.exe 3436 setup.exe 3436 setup.exe 3436 setup.exe 3436 setup.exe 3436 setup.exe 3436 setup.exe 3436 setup.exe 3436 setup.exe 3436 setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3540 wrote to memory of 3436 3540 6fc06502b6260a1cc79ce3694928bd75.exe 85 PID 3540 wrote to memory of 3436 3540 6fc06502b6260a1cc79ce3694928bd75.exe 85 PID 3540 wrote to memory of 3436 3540 6fc06502b6260a1cc79ce3694928bd75.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fc06502b6260a1cc79ce3694928bd75.exe"C:\Users\Admin\AppData\Local\Temp\6fc06502b6260a1cc79ce3694928bd75.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 16803⤵
- Program crash
PID:2960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3436 -ip 34361⤵PID:2636
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
807KB
MD56fc06502b6260a1cc79ce3694928bd75
SHA19f93a8de843787692ec39ab1dfc2be062214b09a
SHA25624b42a920a1b1aa3e6738d2cc759f92670399fc93af253defb0cff733e0d7943
SHA512566f82bb247b8a3106c6ecaf37f159104b4fc00ac9797fd8e2e2f55b27cdb29b78878fd46402dcd1bc6a2aadb5724a1f0d16a400ded77e7af38c99ff69b0bec3