Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe
Resource
win10v2004-20240226-en
General
-
Target
51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe
-
Size
1.4MB
-
MD5
a0621f19e2af56c9bf0805b50dc033a4
-
SHA1
c69570bf661c474a0b206ce514c6e5a5dafcf34b
-
SHA256
51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633
-
SHA512
18c13e2c84bdc15478b98406fef3d689490a8cf240f2721cae3e6e08749e5d968ec907708d52021c389fae3ef05b2d585563afe639301af0453cf4c7c7d58662
-
SSDEEP
12288:yq2/pMwt+pSCppppaapBpRQyh8oTj0G1oAhw0MBfNbK1hfUeL6dd6eJkfB18tfFk:yq2dsJ6hal1COa/ZSUnxuek
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe -
Loads dropped DLL 4 IoCs
pid Process 2944 51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe 1288 WerFault.exe 1288 WerFault.exe 1288 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1288 3052 WerFault.exe 29 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2944 51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3052 51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2944 wrote to memory of 3052 2944 51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe 29 PID 2944 wrote to memory of 3052 2944 51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe 29 PID 2944 wrote to memory of 3052 2944 51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe 29 PID 2944 wrote to memory of 3052 2944 51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe 29 PID 3052 wrote to memory of 1288 3052 51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe 30 PID 3052 wrote to memory of 1288 3052 51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe 30 PID 3052 wrote to memory of 1288 3052 51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe 30 PID 3052 wrote to memory of 1288 3052 51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe"C:\Users\Admin\AppData\Local\Temp\51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exeC:\Users\Admin\AppData\Local\Temp\51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:1288
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\51bdbf0088ec9289e57f4311c676dedeb353ca5e9363c2a2a02c094787a0a633.exe
Filesize1.4MB
MD5248ff092e2936afab8fa5382bc9aaae5
SHA1197c8d62e81f9fff1123046cebe98546bd4c12d3
SHA2564bd2949b61b73f02021fa19e07d13dcf4b6b0df897d3c58cda07d51965950023
SHA5123cd03fa78aaf3bd248dfd33097c5c0a746cc9e6458a32420a747dfa06902f6a8e013d33103cbf1bef52e578e78dd795017c2eba8cea1d83cdf3a897145a9f51c