Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 21:00

General

  • Target

    8d559006cd8712952f7bb89981c6237b.exe

  • Size

    112KB

  • MD5

    8d559006cd8712952f7bb89981c6237b

  • SHA1

    ec9598eb66ef19b9ecccafaf58f7f26630e299e5

  • SHA256

    6b8d0aaafe494d29a4d648815c45235788a1e62551d8bdc9a1369e2a54281a2e

  • SHA512

    7138bccfb9bcda1afc57b51e4e97ba20fa5f3dd78667ffbeb82b1a55325020f86d981ed72d1d450aaf3b30e31f95439ac5e5ee9f18be786de9090ec31329b6b2

  • SSDEEP

    3072:h+nn4DRbbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVU7h8lei:u4D5wvP6bQ7yMP+DE827h5i

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3488
      • C:\Users\Admin\AppData\Local\Temp\8d559006cd8712952f7bb89981c6237b.exe
        "C:\Users\Admin\AppData\Local\Temp\8d559006cd8712952f7bb89981c6237b.exe"
        2⤵
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4992
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 560
          3⤵
          • Program crash
          PID:1680
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4992 -ip 4992
      1⤵
        PID:1660

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/4992-0-0x0000000000400000-0x0000000000420000-memory.dmp

              Filesize

              128KB

            • memory/4992-1-0x0000000000A10000-0x0000000000A40000-memory.dmp

              Filesize

              192KB

            • memory/4992-2-0x00000000009F0000-0x00000000009F1000-memory.dmp

              Filesize

              4KB

            • memory/4992-3-0x00000000009E0000-0x00000000009E3000-memory.dmp

              Filesize

              12KB

            • memory/4992-9-0x0000000002380000-0x0000000002381000-memory.dmp

              Filesize

              4KB

            • memory/4992-8-0x0000000002390000-0x0000000002391000-memory.dmp

              Filesize

              4KB

            • memory/4992-11-0x00000000023A0000-0x00000000023A1000-memory.dmp

              Filesize

              4KB

            • memory/4992-10-0x00000000023B0000-0x00000000023B1000-memory.dmp

              Filesize

              4KB

            • memory/4992-13-0x00000000023C0000-0x00000000023C1000-memory.dmp

              Filesize

              4KB

            • memory/4992-12-0x00000000023D0000-0x00000000023D1000-memory.dmp

              Filesize

              4KB

            • memory/4992-7-0x0000000002360000-0x0000000002361000-memory.dmp

              Filesize

              4KB

            • memory/4992-6-0x0000000002370000-0x0000000002371000-memory.dmp

              Filesize

              4KB

            • memory/4992-5-0x00000000023F0000-0x00000000023F1000-memory.dmp

              Filesize

              4KB

            • memory/4992-4-0x00000000023E0000-0x00000000023E1000-memory.dmp

              Filesize

              4KB

            • memory/4992-14-0x0000000000400000-0x0000000000420000-memory.dmp

              Filesize

              128KB

            • memory/4992-15-0x0000000000A10000-0x0000000000A40000-memory.dmp

              Filesize

              192KB