Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 14:04
Behavioral task
behavioral1
Sample
ac0fa75d432b56421468beb62e5007b3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac0fa75d432b56421468beb62e5007b3.exe
Resource
win10v2004-20240226-en
General
-
Target
ac0fa75d432b56421468beb62e5007b3.exe
-
Size
211KB
-
MD5
ac0fa75d432b56421468beb62e5007b3
-
SHA1
08b899e36299b2b23c210b85397d57db53a78b39
-
SHA256
8f78742bce146b0d7d8870d5d7aa603cfcc198f0c21cfd4ddca8862fc5fc13d3
-
SHA512
26644857e844f88e6637f8e0270deebdc474b152463ded755799be68a24b8d626441c4395fb5cd06d11ba9262966142aa4dc758f1857e7874cc819c7a266340a
-
SSDEEP
6144:27E1dtGmCEqlhP2jsUAo0TMpjDw6Yq3tqU2Lm:7dhDqDOY7o0YpXqU2q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3692 Fkebaa.exe -
resource yara_rule behavioral2/memory/5112-0-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral2/memory/5112-1-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral2/memory/5112-2-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral2/files/0x0008000000023354-11.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Fkebaa.exe ac0fa75d432b56421468beb62e5007b3.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Fkebaa.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Fkebaa.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job ac0fa75d432b56421468beb62e5007b3.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job ac0fa75d432b56421468beb62e5007b3.exe File created C:\Windows\Fkebaa.exe ac0fa75d432b56421468beb62e5007b3.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2520 3692 WerFault.exe 98 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Internet Explorer\Main Fkebaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe 3692 Fkebaa.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5112 ac0fa75d432b56421468beb62e5007b3.exe 3692 Fkebaa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5112 wrote to memory of 3692 5112 ac0fa75d432b56421468beb62e5007b3.exe 98 PID 5112 wrote to memory of 3692 5112 ac0fa75d432b56421468beb62e5007b3.exe 98 PID 5112 wrote to memory of 3692 5112 ac0fa75d432b56421468beb62e5007b3.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac0fa75d432b56421468beb62e5007b3.exe"C:\Users\Admin\AppData\Local\Temp\ac0fa75d432b56421468beb62e5007b3.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\Fkebaa.exeC:\Windows\Fkebaa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:3692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 6243⤵
- Program crash
PID:2520
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1036 --field-trial-handle=2260,i,9938964625802268469,1928462186077019554,262144 --variations-seed-version /prefetch:81⤵PID:1820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3692 -ip 36921⤵PID:1516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5ac0fa75d432b56421468beb62e5007b3
SHA108b899e36299b2b23c210b85397d57db53a78b39
SHA2568f78742bce146b0d7d8870d5d7aa603cfcc198f0c21cfd4ddca8862fc5fc13d3
SHA51226644857e844f88e6637f8e0270deebdc474b152463ded755799be68a24b8d626441c4395fb5cd06d11ba9262966142aa4dc758f1857e7874cc819c7a266340a
-
Filesize
362B
MD5f89f4a2716b3893cf2155c23ac3bd6f0
SHA15f7257748a40e301748774784a6346f06c89b2ca
SHA256cc534c5da997ad6f267348838a17218afed3038f2f2fabf13ca5068ff78e01bb
SHA512147b1a65513f13ee3193d794f845645cb544f7ca96068a9f7ab10a18d6232a959c7d68ad48f8f09b0d309d312b1a1aef26698b55e0296c26c27c35e05d8a402b