Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
8b501f7de309b25a1628d7c15804ef81.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b501f7de309b25a1628d7c15804ef81.exe
Resource
win10v2004-20231215-en
General
-
Target
8b501f7de309b25a1628d7c15804ef81.exe
-
Size
655KB
-
MD5
8b501f7de309b25a1628d7c15804ef81
-
SHA1
63dada412cf160bff55bf921910668b600aac72a
-
SHA256
071ef94f61b04836c1d9f1d51261f7374db152565052a23d07a09cb1ea356417
-
SHA512
1aad4678c3bfc3bea5a111178e018163d185ffe18517ed03159c016d6fd2212891305224bb76c5ef922347847dfd49b75d0b246863887226f9f74abd99a1bc27
-
SSDEEP
12288:UaKWrTjY4RICctN/uscqta6g/MnTz+m4P01vuOXKFsWMX1Rg:FKUTjYoICczmscOaKTiDPX1zv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1500 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2248 Server.exe -
Loads dropped DLL 5 IoCs
pid Process 2436 8b501f7de309b25a1628d7c15804ef81.exe 2436 8b501f7de309b25a1628d7c15804ef81.exe 1784 WerFault.exe 1784 WerFault.exe 1784 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2248 set thread context of 2544 2248 Server.exe 29 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Server.exe 8b501f7de309b25a1628d7c15804ef81.exe File opened for modification C:\Program Files\Server.exe 8b501f7de309b25a1628d7c15804ef81.exe File created C:\Program Files\Delet.bat 8b501f7de309b25a1628d7c15804ef81.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\_Server.exe Server.exe File created C:\Windows\_Server.exe Server.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1784 2248 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2248 2436 8b501f7de309b25a1628d7c15804ef81.exe 28 PID 2436 wrote to memory of 2248 2436 8b501f7de309b25a1628d7c15804ef81.exe 28 PID 2436 wrote to memory of 2248 2436 8b501f7de309b25a1628d7c15804ef81.exe 28 PID 2436 wrote to memory of 2248 2436 8b501f7de309b25a1628d7c15804ef81.exe 28 PID 2248 wrote to memory of 2544 2248 Server.exe 29 PID 2248 wrote to memory of 2544 2248 Server.exe 29 PID 2248 wrote to memory of 2544 2248 Server.exe 29 PID 2248 wrote to memory of 2544 2248 Server.exe 29 PID 2248 wrote to memory of 2544 2248 Server.exe 29 PID 2248 wrote to memory of 2544 2248 Server.exe 29 PID 2248 wrote to memory of 1784 2248 Server.exe 30 PID 2248 wrote to memory of 1784 2248 Server.exe 30 PID 2248 wrote to memory of 1784 2248 Server.exe 30 PID 2248 wrote to memory of 1784 2248 Server.exe 30 PID 2436 wrote to memory of 1500 2436 8b501f7de309b25a1628d7c15804ef81.exe 33 PID 2436 wrote to memory of 1500 2436 8b501f7de309b25a1628d7c15804ef81.exe 33 PID 2436 wrote to memory of 1500 2436 8b501f7de309b25a1628d7c15804ef81.exe 33 PID 2436 wrote to memory of 1500 2436 8b501f7de309b25a1628d7c15804ef81.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b501f7de309b25a1628d7c15804ef81.exe"C:\Users\Admin\AppData\Local\Temp\8b501f7de309b25a1628d7c15804ef81.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files\Server.exe"C:\Program Files\Server.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:2544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 3203⤵
- Loads dropped DLL
- Program crash
PID:1784
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Delet.bat""2⤵
- Deletes itself
PID:1500
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5db1129d0b8e0283be8a8ebec352a740e
SHA17c70d93f4cff4fb3a8af142ed35f9c38ad6c5408
SHA25637613ef10a2ed7ff5fe468f1528ff2b2ad7aca6edd90907291797cee41f20b04
SHA51278c88c1cfb6f1f463eaf0a2f80bf3dd6d833af5db56bdc131228e515b26320452e77b04d46d97f1d3fbc13f7f4f0180ba2a3862ee173727b882ffcbc1eff374e
-
Filesize
655KB
MD58b501f7de309b25a1628d7c15804ef81
SHA163dada412cf160bff55bf921910668b600aac72a
SHA256071ef94f61b04836c1d9f1d51261f7374db152565052a23d07a09cb1ea356417
SHA5121aad4678c3bfc3bea5a111178e018163d185ffe18517ed03159c016d6fd2212891305224bb76c5ef922347847dfd49b75d0b246863887226f9f74abd99a1bc27