Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe
Resource
win10v2004-20240226-en
General
-
Target
565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe
-
Size
3.5MB
-
MD5
bf0900fecd1f36510df1524d950a1bb8
-
SHA1
5d2ed9aef779b438cda943676fb4451962944675
-
SHA256
565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36
-
SHA512
ba546dac4fbb81000d02c67ee6a3e9cf43a1bcf33562e278be2e27492a3ced814176969c633e43fbae88fc5079077482984b8d59e7f70328c92a10181fd25155
-
SSDEEP
49152:uUWTGrgI4mv+niXtXIMfX2wGBDDQ/XSHdX4MPXGgIMbb:uUWTGx4mvHXtWHdDbb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3004 565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe -
Executes dropped EXE 1 IoCs
pid Process 3004 565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe -
Loads dropped DLL 4 IoCs
pid Process 1808 565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe 2652 WerFault.exe 2652 WerFault.exe 2652 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2652 3004 WerFault.exe 29 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1808 565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3004 565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1808 wrote to memory of 3004 1808 565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe 29 PID 1808 wrote to memory of 3004 1808 565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe 29 PID 1808 wrote to memory of 3004 1808 565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe 29 PID 1808 wrote to memory of 3004 1808 565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe 29 PID 3004 wrote to memory of 2652 3004 565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe 30 PID 3004 wrote to memory of 2652 3004 565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe 30 PID 3004 wrote to memory of 2652 3004 565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe 30 PID 3004 wrote to memory of 2652 3004 565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe"C:\Users\Admin\AppData\Local\Temp\565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exeC:\Users\Admin\AppData\Local\Temp\565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:2652
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\565f69918da7c03698903e774d9f2afeb766db3e7b2bc66706523b06822a0d36.exe
Filesize3.5MB
MD582c34ba4afff6595c439802a1b08420b
SHA15f7b3f2efcc57c81139fafb01e8ba9032a45f690
SHA256a7a719492620ca2d7ac31889502e362bfeed8ade6d8a224d44f8b51711481e8b
SHA512d86429d25b21fa7f284db137218cb8418f249c20882a8debaa4535c1012fb9f8c6f2ea4fdbe315720285c844a45fd0efa9e032f86434b8cbfbb23d48b6873583