Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
96ca1cd7e5ab84dfc0f92908120fc104.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
96ca1cd7e5ab84dfc0f92908120fc104.exe
Resource
win10v2004-20231222-en
General
-
Target
96ca1cd7e5ab84dfc0f92908120fc104.exe
-
Size
43KB
-
MD5
96ca1cd7e5ab84dfc0f92908120fc104
-
SHA1
a740d3bd3435a14dd2873c7b665e5be0cc08f08b
-
SHA256
942110272510a43eed52302413287bd08b446fa7da50cc76b7414ce3bafe26a2
-
SHA512
09a7c7f65e644f65fa2d8beadc8db87f3c110d77a299574236cfaa0f396b0a3f7b0e5e3db466432ffaba7540c97cce2f5a66787e1380b31d780fc8ff5a74f15c
-
SSDEEP
768:bCKqDQStlBJ1p+j5ZXFKS34WVuyuMJreKYwjJMQ26AzuN8q8:eKqDQi7c5ZXFKCKjKYQsuI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2668 LL.exe -
Loads dropped DLL 6 IoCs
pid Process 2080 96ca1cd7e5ab84dfc0f92908120fc104.exe 2080 96ca1cd7e5ab84dfc0f92908120fc104.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe 2676 WerFault.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\LL.exe 96ca1cd7e5ab84dfc0f92908120fc104.exe File opened for modification C:\Windows\SysWOW64\LL.exe LL.exe File opened for modification C:\Windows\SysWOW64\LL.exe 96ca1cd7e5ab84dfc0f92908120fc104.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2732 2080 WerFault.exe 27 2676 2668 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2708 2080 96ca1cd7e5ab84dfc0f92908120fc104.exe 28 PID 2080 wrote to memory of 2708 2080 96ca1cd7e5ab84dfc0f92908120fc104.exe 28 PID 2080 wrote to memory of 2708 2080 96ca1cd7e5ab84dfc0f92908120fc104.exe 28 PID 2080 wrote to memory of 2708 2080 96ca1cd7e5ab84dfc0f92908120fc104.exe 28 PID 2080 wrote to memory of 2668 2080 96ca1cd7e5ab84dfc0f92908120fc104.exe 30 PID 2080 wrote to memory of 2668 2080 96ca1cd7e5ab84dfc0f92908120fc104.exe 30 PID 2080 wrote to memory of 2668 2080 96ca1cd7e5ab84dfc0f92908120fc104.exe 30 PID 2080 wrote to memory of 2668 2080 96ca1cd7e5ab84dfc0f92908120fc104.exe 30 PID 2668 wrote to memory of 2744 2668 LL.exe 34 PID 2668 wrote to memory of 2744 2668 LL.exe 34 PID 2668 wrote to memory of 2744 2668 LL.exe 34 PID 2668 wrote to memory of 2744 2668 LL.exe 34 PID 2080 wrote to memory of 2732 2080 96ca1cd7e5ab84dfc0f92908120fc104.exe 31 PID 2668 wrote to memory of 2676 2668 LL.exe 32 PID 2080 wrote to memory of 2732 2080 96ca1cd7e5ab84dfc0f92908120fc104.exe 31 PID 2668 wrote to memory of 2676 2668 LL.exe 32 PID 2080 wrote to memory of 2732 2080 96ca1cd7e5ab84dfc0f92908120fc104.exe 31 PID 2668 wrote to memory of 2676 2668 LL.exe 32 PID 2668 wrote to memory of 2676 2668 LL.exe 32 PID 2080 wrote to memory of 2732 2080 96ca1cd7e5ab84dfc0f92908120fc104.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\96ca1cd7e5ab84dfc0f92908120fc104.exe"C:\Users\Admin\AppData\Local\Temp\96ca1cd7e5ab84dfc0f92908120fc104.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c date 2005-10-312⤵PID:2708
-
-
C:\Windows\SysWOW64\LL.exeC:\Windows\system32\LL.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 4203⤵
- Loads dropped DLL
- Program crash
PID:2676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c date 2005-10-313⤵PID:2744
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 1802⤵
- Program crash
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD596ca1cd7e5ab84dfc0f92908120fc104
SHA1a740d3bd3435a14dd2873c7b665e5be0cc08f08b
SHA256942110272510a43eed52302413287bd08b446fa7da50cc76b7414ce3bafe26a2
SHA51209a7c7f65e644f65fa2d8beadc8db87f3c110d77a299574236cfaa0f396b0a3f7b0e5e3db466432ffaba7540c97cce2f5a66787e1380b31d780fc8ff5a74f15c