Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-01-2024 17:42
Static task
static1
Behavioral task
behavioral1
Sample
77fa451708d26a3f3ed7f8e8cd448a5d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
77fa451708d26a3f3ed7f8e8cd448a5d.exe
Resource
win10v2004-20231222-en
General
-
Target
77fa451708d26a3f3ed7f8e8cd448a5d.exe
-
Size
1.1MB
-
MD5
77fa451708d26a3f3ed7f8e8cd448a5d
-
SHA1
dbb910ce9121220c4baae79884ebfbf7ce86e632
-
SHA256
8ade2070b8a527d59b2ab9c16de81449f368f286b7a826ee33f2182701cf7447
-
SHA512
344e8b4d2544499882bab0d933777b0b4380cde8640288d0084989bbd42eb29093bb2f0a916b2585608197af17d7f817176c50433a16c396f0d31830e1aa95a1
-
SSDEEP
24576:lUXvfNa2/Bjq8y+DtBkRollGQdKnWYwP1Am6xoaF+0OHB4XY513Vd0ZkA:lq/B+8yiDllEQA+uy/hHBOY51ekA
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2364 rundll32.exe 7 2364 rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 1684 f77eaad.exe -
Loads dropped DLL 10 IoCs
pid Process 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2404 WerFault.exe 2404 WerFault.exe 2404 WerFault.exe 2404 WerFault.exe 2404 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 2404 1684 WerFault.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2364 2652 77fa451708d26a3f3ed7f8e8cd448a5d.exe 28 PID 2652 wrote to memory of 2364 2652 77fa451708d26a3f3ed7f8e8cd448a5d.exe 28 PID 2652 wrote to memory of 2364 2652 77fa451708d26a3f3ed7f8e8cd448a5d.exe 28 PID 2652 wrote to memory of 2364 2652 77fa451708d26a3f3ed7f8e8cd448a5d.exe 28 PID 2652 wrote to memory of 2364 2652 77fa451708d26a3f3ed7f8e8cd448a5d.exe 28 PID 2652 wrote to memory of 2364 2652 77fa451708d26a3f3ed7f8e8cd448a5d.exe 28 PID 2652 wrote to memory of 2364 2652 77fa451708d26a3f3ed7f8e8cd448a5d.exe 28 PID 2364 wrote to memory of 1684 2364 rundll32.exe 34 PID 2364 wrote to memory of 1684 2364 rundll32.exe 34 PID 2364 wrote to memory of 1684 2364 rundll32.exe 34 PID 2364 wrote to memory of 1684 2364 rundll32.exe 34 PID 1684 wrote to memory of 2404 1684 f77eaad.exe 33 PID 1684 wrote to memory of 2404 1684 f77eaad.exe 33 PID 1684 wrote to memory of 2404 1684 f77eaad.exe 33 PID 1684 wrote to memory of 2404 1684 f77eaad.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\77fa451708d26a3f3ed7f8e8cd448a5d.exe"C:\Users\Admin\AppData\Local\Temp\77fa451708d26a3f3ed7f8e8cd448a5d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\JWSQ16.z sxsC2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\f77eaad.exe"C:\Users\Admin\AppData\Local\Temp\f77eaad.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 5321⤵
- Loads dropped DLL
- Program crash
PID:2404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5371f44551edf257371a2ab7e70ef9bfd
SHA16dad5ae9d0cca8bc9d2d8cb76e8cdd4d7384f375
SHA256680264905bcd27b0629bfe6b506c1ba2f2239c94636900f9ddc22e34372cbde4
SHA5120ef3c23108e16828f5fb7aee61bd32278d9ed8c0ff3330f51f713604948382745b75d014d807d82f484cde03989a3f97e7639983754006b8bae1ebb8074710b7
-
Filesize
21KB
MD5858939a54a0406e5be7220b92b6eb2b3
SHA1da24c0b6f723a74a8ec59e58c9c0aea3e86b7109
SHA256a30f30a109cb78d5eb1969f6c13f01a1e0a5f07b7ad8b133f5d2616223c1ce0a
SHA5128875d1e43ea59314695747796894a2f171e92f7b04024dbc529af1497331489e279cd06ea03061288089d2f07ad437178b9d62f0bae2e16ae0b95c5681569401