Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/02/2024, 03:17

General

  • Target

    ad8d87e465deebc22385a0445e12895d.exe

  • Size

    180KB

  • MD5

    ad8d87e465deebc22385a0445e12895d

  • SHA1

    c0b1d0eb620e15ac664d204fe956f3adaeed2a29

  • SHA256

    0be71b7842db24b8d8b079a9416fd23d0b2c2a78e1fe972781037205cd6e286f

  • SHA512

    0b89bf5f3334e6115dd6dca13b548e8668a8a4277ffe67d488426fc183f02578ec1dde351a2c60e012a433e4d7116aeefa9b578bfd401955bcb7e503039d28c6

  • SSDEEP

    3072:xYdUOpBR+f16nPjtrZf2Sce0gsKlQvrBmjW48nZn2Sfx8z5aZDZMzwmkc8qAs:xJQZZflcebsZv0joZxx8whZM3kc7As

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 7 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Program crash 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad8d87e465deebc22385a0445e12895d.exe
    "C:\Users\Admin\AppData\Local\Temp\ad8d87e465deebc22385a0445e12895d.exe"
    1⤵
    • Modifies firewall policy service
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of FindShellTrayWindow
    PID:3668
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 444
      2⤵
      • Program crash
      PID:2336
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3668 -ip 3668
    1⤵
      PID:444

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\ad8d87e465deebc22385a0445e12895d.exe

            Filesize

            180KB

            MD5

            ad8d87e465deebc22385a0445e12895d

            SHA1

            c0b1d0eb620e15ac664d204fe956f3adaeed2a29

            SHA256

            0be71b7842db24b8d8b079a9416fd23d0b2c2a78e1fe972781037205cd6e286f

            SHA512

            0b89bf5f3334e6115dd6dca13b548e8668a8a4277ffe67d488426fc183f02578ec1dde351a2c60e012a433e4d7116aeefa9b578bfd401955bcb7e503039d28c6

          • memory/3668-0-0x0000000002210000-0x0000000002211000-memory.dmp

            Filesize

            4KB

          • memory/3668-8-0x0000000000400000-0x0000000000478000-memory.dmp

            Filesize

            480KB

          • memory/3668-10-0x0000000002210000-0x0000000002211000-memory.dmp

            Filesize

            4KB

          • memory/3668-14-0x0000000000400000-0x0000000000478000-memory.dmp

            Filesize

            480KB

          • memory/3668-18-0x0000000000400000-0x0000000000478000-memory.dmp

            Filesize

            480KB

          • memory/3668-19-0x0000000000400000-0x0000000000478000-memory.dmp

            Filesize

            480KB