Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
baaca19b6ad8ea82a51017b3f02cc22a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
baaca19b6ad8ea82a51017b3f02cc22a.exe
Resource
win10v2004-20240226-en
General
-
Target
baaca19b6ad8ea82a51017b3f02cc22a.exe
-
Size
54KB
-
MD5
baaca19b6ad8ea82a51017b3f02cc22a
-
SHA1
c70729ccce217173750fd960fafb8dc08a937487
-
SHA256
cb78cdd2a3b1851d84639bc29f72cf7e21dd82f897d4929835a95daad201c772
-
SHA512
9d5a17706723c8131fa0afcc63e901398793c004730229141fcfeee6f5ed9ab5c30da47e18d004b53a38e3db240c6abd2b242c082002c9b0b7492a85d0a8044c
-
SSDEEP
768:7Cy0qlxmQpMF5N88VbV3qKcj4cpGudIwSjuaEBjnYBLq6rRbkpFvY:50qlxmQpMLvpqRVXIwlaCrYBLrhO9Y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4972 1.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4932 4972 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 772 wrote to memory of 4972 772 baaca19b6ad8ea82a51017b3f02cc22a.exe 85 PID 772 wrote to memory of 4972 772 baaca19b6ad8ea82a51017b3f02cc22a.exe 85 PID 772 wrote to memory of 4972 772 baaca19b6ad8ea82a51017b3f02cc22a.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\baaca19b6ad8ea82a51017b3f02cc22a.exe"C:\Users\Admin\AppData\Local\Temp\baaca19b6ad8ea82a51017b3f02cc22a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\1.exeC:\Users\Admin\AppData\Local\Temp\\1.exe2⤵
- Executes dropped EXE
PID:4972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 2283⤵
- Program crash
PID:4932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4972 -ip 49721⤵PID:4980
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5c757415649133edf150a22ce548fffa7
SHA1625465b20a484e49566001262e782aa4745512e9
SHA2567769c79b2ae1a39e9b3e2b7d873c3a764a271c11a3c20d07e5d2e3cec3f44430
SHA51284f08a1aee1a869c461e99dcff297d780cce69123c678ccdb81cbdc4b46266e4018f89f018f82949dc730469786a5119233b266fa5994ae0edfb168f20b24d6b