Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 05:55
Behavioral task
behavioral1
Sample
b3f4967d7a9a7c29f3844751de5ba7c7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b3f4967d7a9a7c29f3844751de5ba7c7.exe
Resource
win10v2004-20240226-en
General
-
Target
b3f4967d7a9a7c29f3844751de5ba7c7.exe
-
Size
391KB
-
MD5
b3f4967d7a9a7c29f3844751de5ba7c7
-
SHA1
f84b22cc174149603352f13d512fe707b0a7fd92
-
SHA256
eb00619aee2f9e765d8e20bd99491ae6a8c0a3d6a9c04a242bae05a1ac442560
-
SHA512
0686025721c09a66b3c71c9ab69ecf83908edb39fa8bcf13caeacfcd46c006bcc64bb159092339f54977af342a0ec168a791b4d1247bec9f99bf6f5a375a7dd6
-
SSDEEP
12288:MjkArEN249AyE/rbaMct4bO2/VnKyNQs2sHy:/FE//Tct4bOstNZ2sHy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4284 server.exe -
resource yara_rule behavioral2/memory/684-0-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/684-10-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/684-10-0x0000000000400000-0x00000000004B5000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4472 4284 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 684 wrote to memory of 4284 684 b3f4967d7a9a7c29f3844751de5ba7c7.exe 89 PID 684 wrote to memory of 4284 684 b3f4967d7a9a7c29f3844751de5ba7c7.exe 89 PID 684 wrote to memory of 4284 684 b3f4967d7a9a7c29f3844751de5ba7c7.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3f4967d7a9a7c29f3844751de5ba7c7.exe"C:\Users\Admin\AppData\Local\Temp\b3f4967d7a9a7c29f3844751de5ba7c7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp/server.exe2⤵
- Executes dropped EXE
PID:4284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 3363⤵
- Program crash
PID:4472
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4284 -ip 42841⤵PID:4600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD57f5198614e6f45199ee96f6747b4bbb5
SHA16d063375c52a990594a32c3fb1662219046b2189
SHA2566cf93998024b4b1f6a87d0e36c18476a7f0d8251b834fcd120811ab47c93befb
SHA5129688935d19a002e6f13294c854ff3405dadc0204c344f016e42a1c7a365c5a583c6e6a59d7ac6a654d3529ca2e16fcb36197cf55ac2728274b9e230d40522a30