Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-03-2024 02:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b64df0db248d078407a98c3dc44a718e.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
b64df0db248d078407a98c3dc44a718e.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
b64df0db248d078407a98c3dc44a718e.exe
-
Size
1.4MB
-
MD5
b64df0db248d078407a98c3dc44a718e
-
SHA1
ccd5aa0cb94312676934c4fcd74f85ec4bed39fd
-
SHA256
172c20e46b18d03679be0e225c31e4306a5496c95e34f69c7a1a6421580451c0
-
SHA512
e70150acde7a8d64c7eaaad92d58e78c21666bf6316cc344ee4f03381b8167bae8df0a13307badab98dfb89a2e83e83e77288d8b4dce0447e95d76d8a2b52410
-
SSDEEP
24576:FmyVfNTOjYCxi1Uyjuni+fxpLP7WrOiKXGWAao/kNVpa2u+ke2FZ9+S8772ws+wn:sQBOXEjuTphP7WrO6aGkfNu+keY9+S88
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\star1 = "C:\\WINDOWS\\system32\\Winrun.exe" b64df0db248d078407a98c3dc44a718e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\star2 = "C:\\WINDOWS\\system32\\ischot.exe" b64df0db248d078407a98c3dc44a718e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\star3 = "C:\\WINDOWS\\system32\\Xred1.exe" b64df0db248d078407a98c3dc44a718e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\star4 = "C:\\WINDOWS\\system32\\Zred2.exe" b64df0db248d078407a98c3dc44a718e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\star6 = "C:\\WINDOWS\\system32\\MscheldB.exe" b64df0db248d078407a98c3dc44a718e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\star7 = "C:\\WINDOWS\\system32\\Mscheldncx.exe" b64df0db248d078407a98c3dc44a718e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\star8 = "C:\\WINDOWS\\system32\\svscheld.exe" b64df0db248d078407a98c3dc44a718e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\gbpvs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b64df0db248d078407a98c3dc44a718e.exe" b64df0db248d078407a98c3dc44a718e.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\windows\control.ctr b64df0db248d078407a98c3dc44a718e.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1824 1948 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1824 1948 b64df0db248d078407a98c3dc44a718e.exe 30 PID 1948 wrote to memory of 1824 1948 b64df0db248d078407a98c3dc44a718e.exe 30 PID 1948 wrote to memory of 1824 1948 b64df0db248d078407a98c3dc44a718e.exe 30 PID 1948 wrote to memory of 1824 1948 b64df0db248d078407a98c3dc44a718e.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b64df0db248d078407a98c3dc44a718e.exe"C:\Users\Admin\AppData\Local\Temp\b64df0db248d078407a98c3dc44a718e.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 4162⤵
- Program crash
PID:1824
-