Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 21:51
Static task
static1
Behavioral task
behavioral1
Sample
917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe
Resource
win10v2004-20240226-en
General
-
Target
917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe
-
Size
2.3MB
-
MD5
5a1ab38174118460e27e429d1bf63b53
-
SHA1
04bcd2417e72cc122a19b95888c1f87ce2704d14
-
SHA256
917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74
-
SHA512
474e21f6ead0736e8fac67952afd59fd2aaf1861272238cfa3c8b85580e46fced9927c2733bc63f3146de80013602bee973d21a9c9d9eb8be391efe9ffdbe125
-
SSDEEP
24576:D1tJsza+a/ZSkJovBYLYsSwdaJ+4h99Fm+ci2a/ZSrJovBY:BTUg+h7Q+F2g
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1508 917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe -
Executes dropped EXE 1 IoCs
pid Process 1508 917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe -
Loads dropped DLL 4 IoCs
pid Process 768 917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2628 1508 WerFault.exe 29 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 768 917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1508 917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 768 wrote to memory of 1508 768 917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe 29 PID 768 wrote to memory of 1508 768 917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe 29 PID 768 wrote to memory of 1508 768 917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe 29 PID 768 wrote to memory of 1508 768 917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe 29 PID 1508 wrote to memory of 2628 1508 917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe 30 PID 1508 wrote to memory of 2628 1508 917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe 30 PID 1508 wrote to memory of 2628 1508 917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe 30 PID 1508 wrote to memory of 2628 1508 917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe"C:\Users\Admin\AppData\Local\Temp\917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exeC:\Users\Admin\AppData\Local\Temp\917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:2628
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\917da3962b3222e143e9524ecede6a75236484ae64b77dbdd6c2fa17bc506b74.exe
Filesize2.3MB
MD588dcdc2699578abe9855798d2d562a60
SHA11bb9448840c60eb48b05633b79034656d7cef49b
SHA25602bd6a73c6cfe88268b608014a0aa2c48e3c9fa5b4a77f14251d404991802713
SHA5127909c042e0c8eee6e98d3acb071997ba5217da4728de21c443f2fc2b66b02838cb2715950ddc3b81d2990605fff48929009fedbcbdbaaae1852323233d66c611