Overview
overview
7Static
static
39b3895b60a...74.exe
windows7-x64
79b3895b60a...74.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$TEMP/jah312913.exe
windows7-x64
3$TEMP/jah312913.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2024 08:37
Static task
static1
Behavioral task
behavioral1
Sample
9b3895b60aa7ea40160141ad7cb1d574.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b3895b60aa7ea40160141ad7cb1d574.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$TEMP/jah312913.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$TEMP/jah312913.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20231215-en
General
-
Target
9b3895b60aa7ea40160141ad7cb1d574.exe
-
Size
78KB
-
MD5
9b3895b60aa7ea40160141ad7cb1d574
-
SHA1
7d0ec762822cbcdcc514919348ec208ea10f8768
-
SHA256
cf2db4e305a4754cf4d9799d4681b0414b556f0fd83b5760e07c88fff637cb1f
-
SHA512
24cff8694a04940e994c320068338d489df9f526de9bbec9dcd0d61a408ecee91b841c92c5e2c21c38f8bc645c0d6c1e323b036591ebbbd0739eeb55b02efa4d
-
SSDEEP
1536:iZS8H/GZJ402wL7iHwMdnE4tmJ/SnKBjAlc0eV/9u68k6yNsbhC5aUFGVv9XGVv4:i8D40rL2DnVmJanK7/9u6pNuMVuVYg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2420 jah312913.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4016 2420 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2420 2656 9b3895b60aa7ea40160141ad7cb1d574.exe 85 PID 2656 wrote to memory of 2420 2656 9b3895b60aa7ea40160141ad7cb1d574.exe 85 PID 2656 wrote to memory of 2420 2656 9b3895b60aa7ea40160141ad7cb1d574.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b3895b60aa7ea40160141ad7cb1d574.exe"C:\Users\Admin\AppData\Local\Temp\9b3895b60aa7ea40160141ad7cb1d574.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\jah312913.exeC:\Users\Admin\AppData\Local\Temp\jah312913.exe2⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 2243⤵
- Program crash
PID:4016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2420 -ip 24201⤵PID:4088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5f56df4dcfd49c789e0c83e160c1ce623
SHA1e9e2deaa69224c12c089826bd52a18592625b4df
SHA25625d7057b821465f5238226b3846b4b4e589e713265f7cf8dff40ba1c3560c0e1
SHA512f76e7e1f3feb3b98f25eb12885b44b92a7dde66c929721d13518486b9a4564f1fcaeeaadb7cb97f4911711c252dd43383a2fc248a3a52a1c3c62ddd00cc85036