Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03-02-2024 12:57

General

  • Target

    8c619717287a7f8e29e9b494dfd38bff.exe

  • Size

    23KB

  • MD5

    8c619717287a7f8e29e9b494dfd38bff

  • SHA1

    c65484822b2681d83592a7861eaa22df1f932f4f

  • SHA256

    e2d7aeefea7486753d6fb4b4b9f371dac93c726c3276897f25e1372dbdda4aec

  • SHA512

    24a0ffff3a56eb9bcd0d20f9b839989737b11e64657928ac29e5aa7ef93767931afe1664d46642a0cb6960693e4438e7cd3ec9119e2a87a84ea657d490416d60

  • SSDEEP

    384:F2PgksNufDww8QWFr+DgrjCetgMEdj/diM1urlOHxpHY19bYliUR83N1pW:oskLwwWEEnCetgnZdiu8OHcsxR8h

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c619717287a7f8e29e9b494dfd38bff.exe
    "C:\Users\Admin\AppData\Local\Temp\8c619717287a7f8e29e9b494dfd38bff.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 96
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:2352

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\8c619717287a7f8e29e9b494dfd38bff.dat

    Filesize

    19KB

    MD5

    54cded1698f6d6eb89a4e7556630c2c3

    SHA1

    83b25e9064d940ff106df777260735f0d5f56bd9

    SHA256

    e5fba57f96949f3eb2da8032f5528e9277f1d5e98b9ca4a277d6e86040f96648

    SHA512

    c7a6557b082aeab7146b577d24a4cefbb3449ab6e83b243bdf0270e726d5b651683f91a913d80cf6b9007c90150fd2ccb33bd91099be5e5601a3c0f654eeb3c4

  • memory/2304-3-0x0000000010060000-0x0000000010070000-memory.dmp

    Filesize

    64KB

  • memory/2304-4-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2304-9-0x0000000010060000-0x0000000010070000-memory.dmp

    Filesize

    64KB