Analysis
-
max time kernel
118s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 11:27
Static task
static1
Behavioral task
behavioral1
Sample
7fb9b5d6c809318c0f4757ba245f6302.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7fb9b5d6c809318c0f4757ba245f6302.exe
Resource
win10v2004-20231222-en
General
-
Target
7fb9b5d6c809318c0f4757ba245f6302.exe
-
Size
598KB
-
MD5
7fb9b5d6c809318c0f4757ba245f6302
-
SHA1
037a18b0fc5656f1714b59628249fc6b20b3af57
-
SHA256
208ec739072925c9c23ec8f7ab27168acfa9c63dc15d32dddd9a4d3c83116b97
-
SHA512
8fbf569e05bd748bc44681230c84049a9f5f3c5d9fa398338f313353e1ef3ce193187ea7949c239b7d369bae616dbf464a0916ba5365798566ff36abd2b542c0
-
SSDEEP
6144:rhYsafa0idunTIPDan9xTy2VTk0xfdI3QPTYiEYKB6eTBh+:rWlfiunTIe9hTk0xlI30TYUHeT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4512 svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\PxsQWQ\yOEMapej.dll svchost.exe File opened for modification C:\Windows\PxsQWQ\yOEMapej.dll svchost.exe File created C:\Windows\mUCKEPOb.dll 7fb9b5d6c809318c0f4757ba245f6302.exe File created C:\Windows\aWQEKR.dll svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2132 4512 WerFault.exe 76 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2772 wrote to memory of 4512 2772 7fb9b5d6c809318c0f4757ba245f6302.exe 76 PID 2772 wrote to memory of 4512 2772 7fb9b5d6c809318c0f4757ba245f6302.exe 76 PID 2772 wrote to memory of 4512 2772 7fb9b5d6c809318c0f4757ba245f6302.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fb9b5d6c809318c0f4757ba245f6302.exe"C:\Users\Admin\AppData\Local\Temp\7fb9b5d6c809318c0f4757ba245f6302.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\ProgramData\PULxfCSq\svchost.exe"C:\ProgramData\PULxfCSq\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 10363⤵
- Program crash
PID:2132
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4512 -ip 45121⤵PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603KB
MD51d7f8ff71ede62e632ec8dd30fb0032d
SHA1f84e4abf3bf72fa5ff26940b7e2edc5ca0d3b0b0
SHA2562f928ed9bf3aeb7f5dd78e17d5b5c9cace73bb4961ad00ec787bfe31abbe8aba
SHA51241945d44af746b4194066c1d5b8275ee22daa87589a623fd662f6dc15d7230e3b00075263dfa3976a475f8a904ccf733c3dc15e85086db0ddd67d639b7c38925