Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
d5536e526c9c4948dad7f4417f9b671c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5536e526c9c4948dad7f4417f9b671c.exe
Resource
win10v2004-20240226-en
General
-
Target
d5536e526c9c4948dad7f4417f9b671c.exe
-
Size
747KB
-
MD5
d5536e526c9c4948dad7f4417f9b671c
-
SHA1
fe52bd3df4e8910b27151c65db08c548dff16c2c
-
SHA256
b2417b323aec52f1ffbbdbe908c5778116caf588378364b109e606892b58f912
-
SHA512
757cfc637499203e6bb308f2d5b17d37c3be93857fcfa34830f07fdd33bdc26fb59179dc3df11e1726dcd7b6fcbcbea0e777828325925623a5f92e1ceb8ab1eb
-
SSDEEP
12288:uYhdTxARNHD/MejMps3kEyKBjCt407EhNnZwek8eF3Z4mxxIkKeTq+4aFKaXgstB:jzTxARNjUeqaXBOt42EzZfk8eQmXIiTV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2560 RunMgr.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\RunMgr.EXE d5536e526c9c4948dad7f4417f9b671c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2668 2560 WerFault.exe 28 3004 2848 WerFault.exe 27 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2848 d5536e526c9c4948dad7f4417f9b671c.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2560 2848 d5536e526c9c4948dad7f4417f9b671c.exe 28 PID 2848 wrote to memory of 2560 2848 d5536e526c9c4948dad7f4417f9b671c.exe 28 PID 2848 wrote to memory of 2560 2848 d5536e526c9c4948dad7f4417f9b671c.exe 28 PID 2848 wrote to memory of 2560 2848 d5536e526c9c4948dad7f4417f9b671c.exe 28 PID 2848 wrote to memory of 2764 2848 d5536e526c9c4948dad7f4417f9b671c.exe 29 PID 2848 wrote to memory of 2764 2848 d5536e526c9c4948dad7f4417f9b671c.exe 29 PID 2848 wrote to memory of 2764 2848 d5536e526c9c4948dad7f4417f9b671c.exe 29 PID 2848 wrote to memory of 2764 2848 d5536e526c9c4948dad7f4417f9b671c.exe 29 PID 2560 wrote to memory of 2668 2560 RunMgr.EXE 30 PID 2560 wrote to memory of 2668 2560 RunMgr.EXE 30 PID 2560 wrote to memory of 2668 2560 RunMgr.EXE 30 PID 2560 wrote to memory of 2668 2560 RunMgr.EXE 30 PID 2848 wrote to memory of 2412 2848 d5536e526c9c4948dad7f4417f9b671c.exe 32 PID 2848 wrote to memory of 2412 2848 d5536e526c9c4948dad7f4417f9b671c.exe 32 PID 2848 wrote to memory of 2412 2848 d5536e526c9c4948dad7f4417f9b671c.exe 32 PID 2848 wrote to memory of 2412 2848 d5536e526c9c4948dad7f4417f9b671c.exe 32 PID 2848 wrote to memory of 3004 2848 d5536e526c9c4948dad7f4417f9b671c.exe 33 PID 2848 wrote to memory of 3004 2848 d5536e526c9c4948dad7f4417f9b671c.exe 33 PID 2848 wrote to memory of 3004 2848 d5536e526c9c4948dad7f4417f9b671c.exe 33 PID 2848 wrote to memory of 3004 2848 d5536e526c9c4948dad7f4417f9b671c.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5536e526c9c4948dad7f4417f9b671c.exe"C:\Users\Admin\AppData\Local\Temp\d5536e526c9c4948dad7f4417f9b671c.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\RunMgr.EXE"C:\Windows\RunMgr.EXE"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 883⤵
- Program crash
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c del %SystemRoot%\Debug.exe2⤵PID:2764
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\D5536E~1.EXE > nul2⤵PID:2412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 3162⤵
- Program crash
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD5fe1c238e5d56b2ba56db1ee0697d5a26
SHA11fa8658764ff0f33ecaae23cb966a692d2cc16e5
SHA2563a8dfbf9846807917f7f0e65702ddbc77baaba5f3930bbde9472d6d19974a784
SHA512152040c8064976b0fb353bedc5825773bf930ecdf85d2d1248e82d5f099151f570044368ba0de1ae1c92d322ed71beb1001bb629ee870ad77a2f8eb086347300