Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 18:26
Behavioral task
behavioral1
Sample
c94dbfecd76c9b21b5d65ca2be4919ef.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c94dbfecd76c9b21b5d65ca2be4919ef.exe
Resource
win10v2004-20240226-en
General
-
Target
c94dbfecd76c9b21b5d65ca2be4919ef.exe
-
Size
897KB
-
MD5
c94dbfecd76c9b21b5d65ca2be4919ef
-
SHA1
2770cbac07ed04ab169af9fbca2f12efa1afe490
-
SHA256
2353d9dfab1d742aaf0e8e38ee87189cc60acc78f0dfd7ad2d356a44d5ef9a76
-
SHA512
2f43ad310958c47e4dffeb01364eb3bf152153fcb42feeac6b093e760dfe663f14730fb97fe3e2268425acb35b71ed2c8093e3f8d31b9bf76354d0ef5d948a78
-
SSDEEP
24576:O0pUzKL8lVoAWomDtgcnSeRnf72iGxaO:OwUzKL4VoAYgm72iD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2948 setup.exe -
resource yara_rule behavioral2/memory/3096-0-0x0000000000480000-0x0000000000728000-memory.dmp upx behavioral2/files/0x000f000000023150-3.dat upx behavioral2/memory/3096-5-0x0000000000480000-0x0000000000728000-memory.dmp upx behavioral2/memory/2948-6-0x00000000000A0000-0x0000000000348000-memory.dmp upx behavioral2/memory/2948-16-0x00000000000A0000-0x0000000000348000-memory.dmp upx -
Program crash 3 IoCs
pid pid_target Process procid_target 3784 2948 WerFault.exe 88 3516 2948 WerFault.exe 88 1776 2948 WerFault.exe 88 -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3096 c94dbfecd76c9b21b5d65ca2be4919ef.exe 3096 c94dbfecd76c9b21b5d65ca2be4919ef.exe 2948 setup.exe 2948 setup.exe 2948 setup.exe 2948 setup.exe 2948 setup.exe 2948 setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3096 wrote to memory of 2948 3096 c94dbfecd76c9b21b5d65ca2be4919ef.exe 88 PID 3096 wrote to memory of 2948 3096 c94dbfecd76c9b21b5d65ca2be4919ef.exe 88 PID 3096 wrote to memory of 2948 3096 c94dbfecd76c9b21b5d65ca2be4919ef.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c94dbfecd76c9b21b5d65ca2be4919ef.exe"C:\Users\Admin\AppData\Local\Temp\c94dbfecd76c9b21b5d65ca2be4919ef.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 21403⤵
- Program crash
PID:3784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 22283⤵
- Program crash
PID:3516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 22683⤵
- Program crash
PID:1776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2948 -ip 29481⤵PID:1092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 2948 -ip 29481⤵PID:752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 2948 -ip 29481⤵PID:2024
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
897KB
MD5c94dbfecd76c9b21b5d65ca2be4919ef
SHA12770cbac07ed04ab169af9fbca2f12efa1afe490
SHA2562353d9dfab1d742aaf0e8e38ee87189cc60acc78f0dfd7ad2d356a44d5ef9a76
SHA5122f43ad310958c47e4dffeb01364eb3bf152153fcb42feeac6b093e760dfe663f14730fb97fe3e2268425acb35b71ed2c8093e3f8d31b9bf76354d0ef5d948a78