Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
c88a2260b89c314cac2b9878cde6697d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c88a2260b89c314cac2b9878cde6697d.exe
Resource
win10v2004-20240226-en
General
-
Target
c88a2260b89c314cac2b9878cde6697d.exe
-
Size
419KB
-
MD5
c88a2260b89c314cac2b9878cde6697d
-
SHA1
22034c256b0e97ed970c528c12b2c5bf3c8b83bb
-
SHA256
ec82b31675763f161fda751555a7380035c22ec767a4be9acc9e2be830967ae6
-
SHA512
34acfee1c36f6af65a91d7f53ce09cedbc8369ae597fd5962dc1b68df4e7daef453b172e10c1a14bbcc0022d7754155ce720dc70f79b461f72bee1ace04a1c74
-
SSDEEP
6144:+HuJC2dHSpugub26d35PKoVGM+eOkf5Q1hRT0rDS8clw1gWtDcVycV1AEf:nJCQil6dJcjeBgQHc2NWVy+1d
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
Processes:
WerFault.exepid process 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2568 1276 WerFault.exe c88a2260b89c314cac2b9878cde6697d.exe -
NTFS ADS 2 IoCs
Processes:
cmd.execmd.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\c88a2260b89c314cac2b9878cde6697d.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\c88a2260b89c314cac2b9878cde6697d.exe:Zone.Identifier cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c88a2260b89c314cac2b9878cde6697d.exedescription pid process Token: SeDebugPrivilege 1276 c88a2260b89c314cac2b9878cde6697d.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c88a2260b89c314cac2b9878cde6697d.exedescription pid process target process PID 1276 wrote to memory of 2144 1276 c88a2260b89c314cac2b9878cde6697d.exe cmd.exe PID 1276 wrote to memory of 2144 1276 c88a2260b89c314cac2b9878cde6697d.exe cmd.exe PID 1276 wrote to memory of 2144 1276 c88a2260b89c314cac2b9878cde6697d.exe cmd.exe PID 1276 wrote to memory of 2144 1276 c88a2260b89c314cac2b9878cde6697d.exe cmd.exe PID 1276 wrote to memory of 2640 1276 c88a2260b89c314cac2b9878cde6697d.exe cmd.exe PID 1276 wrote to memory of 2640 1276 c88a2260b89c314cac2b9878cde6697d.exe cmd.exe PID 1276 wrote to memory of 2640 1276 c88a2260b89c314cac2b9878cde6697d.exe cmd.exe PID 1276 wrote to memory of 2640 1276 c88a2260b89c314cac2b9878cde6697d.exe cmd.exe PID 1276 wrote to memory of 2568 1276 c88a2260b89c314cac2b9878cde6697d.exe WerFault.exe PID 1276 wrote to memory of 2568 1276 c88a2260b89c314cac2b9878cde6697d.exe WerFault.exe PID 1276 wrote to memory of 2568 1276 c88a2260b89c314cac2b9878cde6697d.exe WerFault.exe PID 1276 wrote to memory of 2568 1276 c88a2260b89c314cac2b9878cde6697d.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c88a2260b89c314cac2b9878cde6697d.exe"C:\Users\Admin\AppData\Local\Temp\c88a2260b89c314cac2b9878cde6697d.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\c88a2260b89c314cac2b9878cde6697d.exe:Zone.Identifier"2⤵
- NTFS ADS
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\c88a2260b89c314cac2b9878cde6697d.exe:Zone.Identifier"2⤵
- NTFS ADS
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 11802⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\c88a2260b89c314cac2b9878cde6697d.exeFilesize
419KB
MD5c88a2260b89c314cac2b9878cde6697d
SHA122034c256b0e97ed970c528c12b2c5bf3c8b83bb
SHA256ec82b31675763f161fda751555a7380035c22ec767a4be9acc9e2be830967ae6
SHA51234acfee1c36f6af65a91d7f53ce09cedbc8369ae597fd5962dc1b68df4e7daef453b172e10c1a14bbcc0022d7754155ce720dc70f79b461f72bee1ace04a1c74
-
memory/1276-0-0x0000000001160000-0x00000000011D0000-memory.dmpFilesize
448KB
-
memory/1276-1-0x00000000743D0000-0x0000000074ABE000-memory.dmpFilesize
6.9MB
-
memory/1276-2-0x00000000743D0000-0x0000000074ABE000-memory.dmpFilesize
6.9MB
-
memory/1276-4-0x0000000000260000-0x000000000028A000-memory.dmpFilesize
168KB
-
memory/1276-3-0x0000000004B80000-0x0000000004BC0000-memory.dmpFilesize
256KB
-
memory/1276-5-0x0000000000610000-0x0000000000618000-memory.dmpFilesize
32KB
-
memory/1276-6-0x0000000000620000-0x000000000062C000-memory.dmpFilesize
48KB
-
memory/1276-7-0x0000000000630000-0x0000000000636000-memory.dmpFilesize
24KB
-
memory/1276-8-0x0000000000960000-0x000000000096C000-memory.dmpFilesize
48KB
-
memory/1276-14-0x0000000004B80000-0x0000000004BC0000-memory.dmpFilesize
256KB