Overview
overview
7Static
static
370d9dca6e9...03.exe
windows7-x64
370d9dca6e9...03.exe
windows10-2004-x64
3$APPDATA/f...tl.exe
windows7-x64
7$APPDATA/f...tl.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...lt.dll
windows7-x64
3$PLUGINSDI...lt.dll
windows10-2004-x64
3fbtoolbar.exe
windows7-x64
7fbtoolbar.exe
windows10-2004-x64
7uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 23:35
Static task
static1
Behavioral task
behavioral1
Sample
70d9dca6e907ff1e8491beaf7db01403.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
70d9dca6e907ff1e8491beaf7db01403.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$APPDATA/fastwinutl/fastwinutl.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$APPDATA/fastwinutl/fastwinutl.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/wuaclt.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/wuaclt.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
fbtoolbar.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
fbtoolbar.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
uninst.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
uninst.exe
Resource
win10v2004-20231215-en
General
-
Target
$APPDATA/fastwinutl/fastwinutl.exe
-
Size
251KB
-
MD5
e97796d9487db7cdc66b836704050fd4
-
SHA1
6e25bca3dfeeab155082e25816117ecb3c15915c
-
SHA256
879ae79db4c74b9e216ed8efc262e6630a5de2588fca547ac6406c6cd4ede24b
-
SHA512
720b33ff0a6228fe1541ffd5e7cf146333bd21a93af82453550aed7cd28d396d4074df922a1243dfb5ee9ec048fc916ca508fdffecfcf8dd616a01395dc793e7
-
SSDEEP
6144:vmrhOQl5FbpiROMWQt5bCeY9D7Nby2h81p6nBoPSoTM:vmrhLtSO7QtTYtNe266nBqSoTM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3036 fastwinutl.exe -
Loads dropped DLL 3 IoCs
pid Process 1376 rundll32.exe 1376 rundll32.exe 1376 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 460 1376 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3612 wrote to memory of 3036 3612 fastwinutl.exe 85 PID 3612 wrote to memory of 3036 3612 fastwinutl.exe 85 PID 3612 wrote to memory of 3036 3612 fastwinutl.exe 85 PID 3036 wrote to memory of 1376 3036 fastwinutl.exe 86 PID 3036 wrote to memory of 1376 3036 fastwinutl.exe 86 PID 3036 wrote to memory of 1376 3036 fastwinutl.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\$APPDATA\fastwinutl\fastwinutl.exe"C:\Users\Admin\AppData\Local\Temp\$APPDATA\fastwinutl\fastwinutl.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Roaming\fastwinutl\fastwinutl.exeC:\Users\Admin\AppData\Roaming\fastwinutl\fastwinutl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Roaming\FASTWI~1\FASTWI~1.DLL 0003⤵
- Loads dropped DLL
PID:1376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 7484⤵
- Program crash
PID:460
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1376 -ip 13761⤵PID:4316
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5fb955e4d9848b983432207a85f44e4e6
SHA1619ff8ef8bb036c03f9ef827e73aaf735caaa518
SHA25699e51aa3af8834cb7ecec5109516b7cd4f6a0706c40ec9f23a6b30a9d79aee6a
SHA512577aa6e523fafa0bbfbb5842dd5ffa659b73a976e837e5d38c4cd52013fcc6448e82d734309b47af74c0be93767c461ece2600d9a0cdb7ce43012f16935bf36d
-
Filesize
160KB
MD59a422a0a2e213225702ecb3c43836af6
SHA168c617226565379e135fc6597f9ee04e9292fa87
SHA256fc8636f3dd9da67eee08b1e598384715dc21fda681ec4f6a31e76e2a5bad79e2
SHA512d68d94fb0dd6de1b075fbf313da46569ee9c2ff4d4448784f5fbda16cc75fa2a8a5f6192b10e7b96a375f34abea674aac17386bd5f96b7548a4530c6dd0c5e50
-
Filesize
251KB
MD5e97796d9487db7cdc66b836704050fd4
SHA16e25bca3dfeeab155082e25816117ecb3c15915c
SHA256879ae79db4c74b9e216ed8efc262e6630a5de2588fca547ac6406c6cd4ede24b
SHA512720b33ff0a6228fe1541ffd5e7cf146333bd21a93af82453550aed7cd28d396d4074df922a1243dfb5ee9ec048fc916ca508fdffecfcf8dd616a01395dc793e7