Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 17:30
Behavioral task
behavioral1
Sample
7ad7e7e9e3d5da653bfb768cc00b7f33.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ad7e7e9e3d5da653bfb768cc00b7f33.exe
Resource
win10v2004-20231222-en
General
-
Target
7ad7e7e9e3d5da653bfb768cc00b7f33.exe
-
Size
8.9MB
-
MD5
7ad7e7e9e3d5da653bfb768cc00b7f33
-
SHA1
83fa57c745fbcc15c879a393dcb40f88e7add47b
-
SHA256
d596a6abe6fefa03567cfc81c737820b592339952d6ac9227af07f2fc471d2fc
-
SHA512
87715b53532b34b7851c6490c6c0a50c3a799a520abe9b749d245d37d0b2cb27c6fda78470bedee1bd7f411df735724f0d98619dd302afadea6e47d2270bfab6
-
SSDEEP
196608:TOKHq1sTHFjcm/GLnRNMonNUqWTpqp3zMh7/Ofc2vWKfl:TpHq+Hy0GLnjMWNUM3zCWP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2836 MAXIMUS.EXE -
Loads dropped DLL 1 IoCs
pid Process 1988 7ad7e7e9e3d5da653bfb768cc00b7f33.exe -
resource yara_rule behavioral1/memory/1988-9-0x0000000000350000-0x00000000013B0000-memory.dmp vmprotect behavioral1/memory/1988-44-0x0000000000350000-0x00000000013B0000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2760 1988 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1988 7ad7e7e9e3d5da653bfb768cc00b7f33.exe 1988 7ad7e7e9e3d5da653bfb768cc00b7f33.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2836 1988 7ad7e7e9e3d5da653bfb768cc00b7f33.exe 29 PID 1988 wrote to memory of 2836 1988 7ad7e7e9e3d5da653bfb768cc00b7f33.exe 29 PID 1988 wrote to memory of 2836 1988 7ad7e7e9e3d5da653bfb768cc00b7f33.exe 29 PID 1988 wrote to memory of 2836 1988 7ad7e7e9e3d5da653bfb768cc00b7f33.exe 29 PID 1988 wrote to memory of 2760 1988 7ad7e7e9e3d5da653bfb768cc00b7f33.exe 28 PID 1988 wrote to memory of 2760 1988 7ad7e7e9e3d5da653bfb768cc00b7f33.exe 28 PID 1988 wrote to memory of 2760 1988 7ad7e7e9e3d5da653bfb768cc00b7f33.exe 28 PID 1988 wrote to memory of 2760 1988 7ad7e7e9e3d5da653bfb768cc00b7f33.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ad7e7e9e3d5da653bfb768cc00b7f33.exe"C:\Users\Admin\AppData\Local\Temp\7ad7e7e9e3d5da653bfb768cc00b7f33.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 4482⤵
- Program crash
PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\MAXIMUS.EXE"C:\Users\Admin\AppData\Local\Temp\MAXIMUS.EXE"2⤵
- Executes dropped EXE
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166KB
MD5b94c2d6927a4316a042051d8fd167523
SHA1b95efa87ba635321bdf58bf8fa976633f24737a5
SHA256326a24c022de6c9e928cfa35673e9d8c837f251f1cfc82facdc45116e48206e1
SHA51261a138aa410202b9cdd2fef3bcd6a59b64d6e0454b5e3a3fbeb50cd550af7ea498bb46f313592a07d8ad09d80497d3d8b2e13231983d31e28b79fcac58a7dbe9
-
Filesize
72KB
MD5b46740dba5d4ff64dbf85f1b08f20660
SHA14931b99477f01d88f0b73b44f0b561613b564a48
SHA256be4f891c25e94ccce0576c589e9442e4bbca7862fa44161d69228240e8bd2bb4
SHA5129d4c5a332ea3fa98e0e849bdc33dfa6ff2a32fa2ea459411fecc4f26cecbdf1cb224d28882ead6a0696b06c1525c6b5a30dc89da12dca720cfa7e509458c46de