Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-03-2024 03:28
Static task
static1
Behavioral task
behavioral1
Sample
ba655e37c66c2114a3ef4fbda7cbb3bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba655e37c66c2114a3ef4fbda7cbb3bd.exe
Resource
win10v2004-20231215-en
General
-
Target
ba655e37c66c2114a3ef4fbda7cbb3bd.exe
-
Size
3.5MB
-
MD5
ba655e37c66c2114a3ef4fbda7cbb3bd
-
SHA1
335a01e810066a1462356ed1922851b5b37d23bd
-
SHA256
312afb2c3b152d7279e7ff0d7b405d0acce81a6cb62548c47a9550227edd852c
-
SHA512
a0676a0bce49ac34e3b1483c77e0d8bd8406ae25f725aef5db3674f37e8694b6fccc8198e36e8c3a0bddf3d5224f6708ab67ab1e98b3ff8fcd3c546ed0ad2b56
-
SSDEEP
49152:IT5gfniXtXIMfX2wGBDDQ/XSHdX4MPXGg:i1XtWHd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2928 ba655e37c66c2114a3ef4fbda7cbb3bd.exe -
Executes dropped EXE 1 IoCs
pid Process 2928 ba655e37c66c2114a3ef4fbda7cbb3bd.exe -
Loads dropped DLL 4 IoCs
pid Process 1752 ba655e37c66c2114a3ef4fbda7cbb3bd.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3064 2928 WerFault.exe 29 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1752 ba655e37c66c2114a3ef4fbda7cbb3bd.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2928 ba655e37c66c2114a3ef4fbda7cbb3bd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2928 1752 ba655e37c66c2114a3ef4fbda7cbb3bd.exe 29 PID 1752 wrote to memory of 2928 1752 ba655e37c66c2114a3ef4fbda7cbb3bd.exe 29 PID 1752 wrote to memory of 2928 1752 ba655e37c66c2114a3ef4fbda7cbb3bd.exe 29 PID 1752 wrote to memory of 2928 1752 ba655e37c66c2114a3ef4fbda7cbb3bd.exe 29 PID 2928 wrote to memory of 3064 2928 ba655e37c66c2114a3ef4fbda7cbb3bd.exe 30 PID 2928 wrote to memory of 3064 2928 ba655e37c66c2114a3ef4fbda7cbb3bd.exe 30 PID 2928 wrote to memory of 3064 2928 ba655e37c66c2114a3ef4fbda7cbb3bd.exe 30 PID 2928 wrote to memory of 3064 2928 ba655e37c66c2114a3ef4fbda7cbb3bd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba655e37c66c2114a3ef4fbda7cbb3bd.exe"C:\Users\Admin\AppData\Local\Temp\ba655e37c66c2114a3ef4fbda7cbb3bd.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\ba655e37c66c2114a3ef4fbda7cbb3bd.exeC:\Users\Admin\AppData\Local\Temp\ba655e37c66c2114a3ef4fbda7cbb3bd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:3064
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5f14504276a1eddb8919085fe0b1f66e3
SHA1d09ae55a7b19cb5237508d7ab88d5d2ef63c1215
SHA2561fad4ccf07009ece70d484701e326e885850b1f87442fc742cf099ba202a10fc
SHA5128b9c1b522459630e9469fa5e69f33f54d1cf3dff60bd9bde1c1ef95e72fc29f7deaa4bd20a56a17a5cc1e16c83a37c354f4d8a5541ddfc42d771ceb3064a1888
-
Filesize
320KB
MD5275738b2197fd597a7526cf251af2cf7
SHA17363cf8396e514ee0e307fba508e445eedd49726
SHA25683d0245d902670b7de1ee872b63641122e6541523c7c7db8ba671bc818d1492f
SHA51297e60ef080fe190cd5a4e2e0f79c8727d1f2f6cfcdc2e146fea2b9e04d3b07b40d57c98926209aa464dc3cabfe012c30e9ea16a0be9217c32685d4528d28bcdd