Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 23:22
Behavioral task
behavioral1
Sample
c71b92c5b27400cc09927f865f7de13d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c71b92c5b27400cc09927f865f7de13d.exe
Resource
win10v2004-20240226-en
General
-
Target
c71b92c5b27400cc09927f865f7de13d.exe
-
Size
907KB
-
MD5
c71b92c5b27400cc09927f865f7de13d
-
SHA1
deed466ac916a02607b496b22479d5dfec1ed92c
-
SHA256
6027a80b8f3b5f4c24ca557e0a45eb8214edd10c6bc245d2423dc34dfcc79d8e
-
SHA512
d226ba35875fab84dc81f3afda7a047c8acd3f87632c77721e29c057ea987bc2b1bb87fa1fad37ebf04c605f1d1175f3c873712b95e8fb1dee20334dc99c9da3
-
SSDEEP
24576:BOvwGqD8p+bmfe0LBcZEtEl/D9sJePRwBY:QyW+0exlb9sJePWq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4768 setup.exe -
resource yara_rule behavioral2/memory/4072-0-0x0000000000500000-0x00000000007B1000-memory.dmp upx behavioral2/files/0x000f000000023140-3.dat upx behavioral2/memory/4768-6-0x0000000000100000-0x00000000003B1000-memory.dmp upx behavioral2/memory/4072-5-0x0000000000500000-0x00000000007B1000-memory.dmp upx behavioral2/memory/4768-9-0x0000000000100000-0x00000000003B1000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 5056 4768 WerFault.exe 88 -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4072 c71b92c5b27400cc09927f865f7de13d.exe 4072 c71b92c5b27400cc09927f865f7de13d.exe 4768 setup.exe 4768 setup.exe 4768 setup.exe 4768 setup.exe 4768 setup.exe 4768 setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4072 wrote to memory of 4768 4072 c71b92c5b27400cc09927f865f7de13d.exe 88 PID 4072 wrote to memory of 4768 4072 c71b92c5b27400cc09927f865f7de13d.exe 88 PID 4072 wrote to memory of 4768 4072 c71b92c5b27400cc09927f865f7de13d.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c71b92c5b27400cc09927f865f7de13d.exe"C:\Users\Admin\AppData\Local\Temp\c71b92c5b27400cc09927f865f7de13d.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 7763⤵
- Program crash
PID:5056
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4768 -ip 47681⤵PID:4180
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD5c71b92c5b27400cc09927f865f7de13d
SHA1deed466ac916a02607b496b22479d5dfec1ed92c
SHA2566027a80b8f3b5f4c24ca557e0a45eb8214edd10c6bc245d2423dc34dfcc79d8e
SHA512d226ba35875fab84dc81f3afda7a047c8acd3f87632c77721e29c057ea987bc2b1bb87fa1fad37ebf04c605f1d1175f3c873712b95e8fb1dee20334dc99c9da3