Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 09:07

General

  • Target

    96ca1cd7e5ab84dfc0f92908120fc104.exe

  • Size

    43KB

  • MD5

    96ca1cd7e5ab84dfc0f92908120fc104

  • SHA1

    a740d3bd3435a14dd2873c7b665e5be0cc08f08b

  • SHA256

    942110272510a43eed52302413287bd08b446fa7da50cc76b7414ce3bafe26a2

  • SHA512

    09a7c7f65e644f65fa2d8beadc8db87f3c110d77a299574236cfaa0f396b0a3f7b0e5e3db466432ffaba7540c97cce2f5a66787e1380b31d780fc8ff5a74f15c

  • SSDEEP

    768:bCKqDQStlBJ1p+j5ZXFKS34WVuyuMJreKYwjJMQ26AzuN8q8:eKqDQi7c5ZXFKCKjKYQsuI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96ca1cd7e5ab84dfc0f92908120fc104.exe
    "C:\Users\Admin\AppData\Local\Temp\96ca1cd7e5ab84dfc0f92908120fc104.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c date 2005-10-31
      2⤵
        PID:2708
      • C:\Windows\SysWOW64\LL.exe
        C:\Windows\system32\LL.exe
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 420
          3⤵
          • Loads dropped DLL
          • Program crash
          PID:2676
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c date 2005-10-31
          3⤵
            PID:2744
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 180
          2⤵
          • Program crash
          PID:2732

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Windows\SysWOW64\LL.exe

        Filesize

        43KB

        MD5

        96ca1cd7e5ab84dfc0f92908120fc104

        SHA1

        a740d3bd3435a14dd2873c7b665e5be0cc08f08b

        SHA256

        942110272510a43eed52302413287bd08b446fa7da50cc76b7414ce3bafe26a2

        SHA512

        09a7c7f65e644f65fa2d8beadc8db87f3c110d77a299574236cfaa0f396b0a3f7b0e5e3db466432ffaba7540c97cce2f5a66787e1380b31d780fc8ff5a74f15c

      • memory/2080-0-0x0000000000400000-0x0000000000411200-memory.dmp

        Filesize

        68KB

      • memory/2080-10-0x00000000003B0000-0x00000000003C2000-memory.dmp

        Filesize

        72KB

      • memory/2080-11-0x00000000003B0000-0x00000000003C2000-memory.dmp

        Filesize

        72KB

      • memory/2080-18-0x0000000000400000-0x0000000000411200-memory.dmp

        Filesize

        68KB

      • memory/2080-22-0x00000000003B0000-0x00000000003C2000-memory.dmp

        Filesize

        72KB

      • memory/2080-23-0x00000000003B0000-0x00000000003C2000-memory.dmp

        Filesize

        72KB

      • memory/2668-12-0x0000000000400000-0x0000000000411200-memory.dmp

        Filesize

        68KB

      • memory/2668-19-0x0000000000400000-0x0000000000411200-memory.dmp

        Filesize

        68KB