Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
7fe7803e1b7275d87764578a3ed65508.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7fe7803e1b7275d87764578a3ed65508.exe
Resource
win10v2004-20231215-en
General
-
Target
7fe7803e1b7275d87764578a3ed65508.exe
-
Size
177KB
-
MD5
7fe7803e1b7275d87764578a3ed65508
-
SHA1
42c2d1cf84e11dc851c6c3bf4860041f38b04455
-
SHA256
e354bc1b5229233b255c05db18286de473ecfd2602bb5dc91cab3c300dbd0181
-
SHA512
c4e257f3330adeab1ae3f8822acc5413784de616a3604204e2ef89f0972a9df2cc26d8025bd25890c45ee67e94a1c4b5d76daeea867368fbd7a4612fc8acffde
-
SSDEEP
3072:75IpZ9Wafm1YXFknyk82REcdZmaiabcMMRZkzPYHn93KlX9awYE8gcHHyAmAU:mpZ5fcYVu/YMoarIZkzAH94apZmA
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\O: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\R: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\V: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\X: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\Z: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\E: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\L: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\M: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\N: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\T: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\P: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\W: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\Y: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\G: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\H: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\I: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\K: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\Q: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\S: 7fe7803e1b7275d87764578a3ed65508.exe File opened (read-only) \??\U: 7fe7803e1b7275d87764578a3ed65508.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 800 4416 WerFault.exe 77 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4416 7fe7803e1b7275d87764578a3ed65508.exe 4416 7fe7803e1b7275d87764578a3ed65508.exe 4416 7fe7803e1b7275d87764578a3ed65508.exe 4416 7fe7803e1b7275d87764578a3ed65508.exe 4416 7fe7803e1b7275d87764578a3ed65508.exe 4416 7fe7803e1b7275d87764578a3ed65508.exe 4416 7fe7803e1b7275d87764578a3ed65508.exe 4416 7fe7803e1b7275d87764578a3ed65508.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fe7803e1b7275d87764578a3ed65508.exe"C:\Users\Admin\AppData\Local\Temp\7fe7803e1b7275d87764578a3ed65508.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:4416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 8402⤵
- Program crash
PID:800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4416 -ip 44161⤵PID:4420