Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
e1f6f896e9cf32e8886c4c6f86a23868.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1f6f896e9cf32e8886c4c6f86a23868.exe
Resource
win10v2004-20240226-en
General
-
Target
e1f6f896e9cf32e8886c4c6f86a23868.exe
-
Size
258KB
-
MD5
e1f6f896e9cf32e8886c4c6f86a23868
-
SHA1
3d24066aad405837cec45b5e9e73a734acc373e6
-
SHA256
cfe8e2a7e37cee1f4a2871ce5ee3b27e97a52085161788751b051394e2b235d5
-
SHA512
b1b94aaed49f29326171f3959615bac413bf46bea45783312f1ef2d874dbcf84f3bd11b41cd21ab344b52463f354368ab308007201c061cbf74319bba09a97b3
-
SSDEEP
6144:dDMbIIJdEmxZzFRIpQy9W4lyLHWyPEuSl4L1OZWyZ:dIbJTRIpFWnzVPntLkE
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3124 e1f6f896e9cf32e8886c4c6f86a23868.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll e1f6f896e9cf32e8886c4c6f86a23868.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1808 3124 WerFault.exe 88 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3124 e1f6f896e9cf32e8886c4c6f86a23868.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1f6f896e9cf32e8886c4c6f86a23868.exe"C:\Users\Admin\AppData\Local\Temp\e1f6f896e9cf32e8886c4c6f86a23868.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 5442⤵
- Program crash
PID:1808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3124 -ip 31241⤵PID:1484
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5d2541e52b63376ad4c3fee4bc5e5368a
SHA1227d23c0afad47c532c1566a1fb746e5b41877c3
SHA256a1308f23f6096c57a9117556942755ae74f730a71795aed46648dd48f80493c9
SHA51267ba72eac7fd08eccec445c6efe7a48d52a9339df86301ab27b53a91864a9cbecd20bcf4ed7022656df8ac411daf3bd3e1d0efbb45db67456845eb18e4f2779c