Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2024 06:50
Static task
static1
Behavioral task
behavioral1
Sample
8e7de45b002831cda6b754c34dabfb13.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e7de45b002831cda6b754c34dabfb13.exe
Resource
win10v2004-20231215-en
General
-
Target
8e7de45b002831cda6b754c34dabfb13.exe
-
Size
3.7MB
-
MD5
8e7de45b002831cda6b754c34dabfb13
-
SHA1
a02d47ce255579b62a795d6683ab739e2af43491
-
SHA256
9896658ff247be3b1d23a0b1f6fad3b0a50a22a929ac82f78e0eccf246188b80
-
SHA512
b6f58eb6457e3067cdb64578f362fc22b2183aca4accda34a6c85347204c33c134c09404d741cab04d87b2410808cbcb139e3921f36c9db099e63d811b6b8fdc
-
SSDEEP
98304:GX47XHcqMSX2bYxxbaLhgQKW8wWAgBCxaBhqyyazx1b:sCHLMScYvaFg5Cg8O5ya/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4004 8e7de45b002831cda6b754c34dabfb13.tmp 4980 Ut.exe -
Loads dropped DLL 1 IoCs
pid Process 4004 8e7de45b002831cda6b754c34dabfb13.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 27 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Non\ut\sqlite3.dll 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\ut\is-JC7PV.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File opened for modification C:\Program Files (x86)\Non\unins000.dat 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\is-INL6J.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\is-DORBL.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\ut\is-52AII.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\velit\is-SK5ID.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\ut\is-SHKQO.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\is-THCFC.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\is-150JP.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\is-36IE1.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\fugiat\is-B7VLI.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\fugiat\is-8G3SC.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\ut\is-6ENG7.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\velit\is-KVF1L.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\fugiat\is-97DNK.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\fugiat\is-T5PHG.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\ut\is-FE2OQ.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\ut\is-1FHUJ.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\ut\is-8NKQA.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\ut\is-S0K25.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\unins000.dat 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\is-UBRO9.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\ut\is-LLCF3.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\ut\is-G8S4M.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File created C:\Program Files (x86)\Non\velit\is-VPK1H.tmp 8e7de45b002831cda6b754c34dabfb13.tmp File opened for modification C:\Program Files (x86)\Non\ut\Ut.exe 8e7de45b002831cda6b754c34dabfb13.tmp -
Program crash 1 IoCs
pid pid_target Process procid_target 208 4980 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4004 8e7de45b002831cda6b754c34dabfb13.tmp 4004 8e7de45b002831cda6b754c34dabfb13.tmp 4980 Ut.exe 4980 Ut.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4004 8e7de45b002831cda6b754c34dabfb13.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1732 wrote to memory of 4004 1732 8e7de45b002831cda6b754c34dabfb13.exe 86 PID 1732 wrote to memory of 4004 1732 8e7de45b002831cda6b754c34dabfb13.exe 86 PID 1732 wrote to memory of 4004 1732 8e7de45b002831cda6b754c34dabfb13.exe 86 PID 4004 wrote to memory of 4980 4004 8e7de45b002831cda6b754c34dabfb13.tmp 87 PID 4004 wrote to memory of 4980 4004 8e7de45b002831cda6b754c34dabfb13.tmp 87 PID 4004 wrote to memory of 4980 4004 8e7de45b002831cda6b754c34dabfb13.tmp 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e7de45b002831cda6b754c34dabfb13.exe"C:\Users\Admin\AppData\Local\Temp\8e7de45b002831cda6b754c34dabfb13.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\is-4K9QG.tmp\8e7de45b002831cda6b754c34dabfb13.tmp"C:\Users\Admin\AppData\Local\Temp\is-4K9QG.tmp\8e7de45b002831cda6b754c34dabfb13.tmp" /SL5="$D002A,3196655,721408,C:\Users\Admin\AppData\Local\Temp\8e7de45b002831cda6b754c34dabfb13.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Program Files (x86)\Non\ut\Ut.exe"C:\Program Files (x86)\Non/\ut\Ut.exe" 8409edbaf42c30564bf561fddda1ef893⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 8684⤵
- Program crash
PID:208
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4980 -ip 49801⤵PID:4828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
785KB
MD582124a19407ab81d5b12cc5be4371c60
SHA1b2d445fa5c6f2d23c862b8d671f253070731056b
SHA2568b7bb20006651675c98025eae13195937f4a4221758999e34da4978119d77b2b
SHA5121d88120fd59db2e47ca1e9a1940323dd00e29e13118332066db18dd818d773b5cfc3644f9ab3ac343e78668eaeaffd14ee683922d2799956452bbabda4b21c8c
-
Filesize
1.9MB
MD5847e8ca6f25c7dfbfd97818d547fe6ed
SHA10b936121e139f1acbb4c18199f315c2f2b235a8e
SHA2562201a394270fd9d114074dc88885f9e36ff8567ae8d8f338640cf0165e8f82c3
SHA5121666abfdc2e04f453a07361b94f91e1d6aa65c6aa4cebf6e6a82ec8a0541656ae294f978d9f14cfab5d3ffd45a55dcb73e8a0a771f889ad6cdf9af8da9eac33e
-
Filesize
2.4MB
MD53fddfbaa9d029821152e746edbabf7ce
SHA1703690b3a2377047f6755e9b5274d608791b8062
SHA256787cef456bd60075199c04ac38dd5e65291bd3a930b132538889e4dafb76fa1a
SHA512fd50e763c6523022f1be02a6a690d2a2dec4e9a73c941314b4a810bbd7605d4058c5c49c53dcbdd8fde5e6c4d2c78fcec52b5bca087cbf552bc1ce90819c4903
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63