Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 13:11
Behavioral task
behavioral1
Sample
e1bf51415226b1e0b0e4e2d8686647ae.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
e1bf51415226b1e0b0e4e2d8686647ae.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
e1bf51415226b1e0b0e4e2d8686647ae.exe
-
Size
1.9MB
-
MD5
e1bf51415226b1e0b0e4e2d8686647ae
-
SHA1
4533726fbf460b06e0e75e22b0bc2ed49036bf20
-
SHA256
32c74c85e924613bb6f49b1ae4b147d01c325332f2b13745bd3112b5ef10cbb4
-
SHA512
0171fefc1224ad0d8184dec21ae5cf628432a4dd13a37e9931f162477b8a908d7dc81e49e329f414bb321c96548c5658ca2aa57c318d4fd92ba7689354e69f43
-
SSDEEP
49152:1ZM38jgRo8aKDmOf6lilJksYToRRrJ53WEZhVN4SBCBqC81:AdFyojksY079tdZhP4SUBR6
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\eventlog\ImagePath = "%SystemRoot%\\system32\\services.exe" e1bf51415226b1e0b0e4e2d8686647ae.exe -
resource yara_rule behavioral1/memory/1540-0-0x0000000000400000-0x000000000230A000-memory.dmp upx behavioral1/memory/1540-2-0x0000000000400000-0x000000000230A000-memory.dmp upx behavioral1/memory/1540-3-0x0000000000400000-0x000000000230A000-memory.dmp upx behavioral1/memory/1540-4-0x0000000000400000-0x000000000230A000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\placavga.ico e1bf51415226b1e0b0e4e2d8686647ae.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2532 1540 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2532 1540 e1bf51415226b1e0b0e4e2d8686647ae.exe 28 PID 1540 wrote to memory of 2532 1540 e1bf51415226b1e0b0e4e2d8686647ae.exe 28 PID 1540 wrote to memory of 2532 1540 e1bf51415226b1e0b0e4e2d8686647ae.exe 28 PID 1540 wrote to memory of 2532 1540 e1bf51415226b1e0b0e4e2d8686647ae.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1bf51415226b1e0b0e4e2d8686647ae.exe"C:\Users\Admin\AppData\Local\Temp\e1bf51415226b1e0b0e4e2d8686647ae.exe"1⤵
- Sets service image path in registry
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 6122⤵
- Program crash
PID:2532
-