Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 09:46
Static task
static1
Behavioral task
behavioral1
Sample
14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe
Resource
win7-20240221-en
General
-
Target
14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe
-
Size
6.6MB
-
MD5
5f6aacd3106f727d45c295fd0f25054d
-
SHA1
0d584d72fe321332df0b0a17720191ad96737f47
-
SHA256
14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196
-
SHA512
8eaa103be426a037b5ee1b99b0949672af1b674491dab8d5f24f5bf6f13e5817800574c0c779d54ef1f9ada7a6150ba3a6a63bf90eb6a5885465f6e2275764b0
-
SSDEEP
98304:QSiEgahK0fCLAeApJe/i7t5/xPUa5BDul4X0CnewymF+ATMM9LWmZSWNQs5Ia/Ba:T/PfCEl5o3TwymFrX9L5sWB0Uy
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2916 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 2396 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 2012 mathparser.exe -
Loads dropped DLL 12 IoCs
pid Process 2660 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 2596 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 2396 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 2396 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 2012 mathparser.exe 1412 WerFault.exe 1412 WerFault.exe 1412 WerFault.exe 1412 WerFault.exe 1412 WerFault.exe 1412 WerFault.exe 1412 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1412 2012 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2396 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 2396 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2916 2660 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 28 PID 2660 wrote to memory of 2916 2660 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 28 PID 2660 wrote to memory of 2916 2660 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 28 PID 2660 wrote to memory of 2916 2660 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 28 PID 2660 wrote to memory of 2916 2660 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 28 PID 2660 wrote to memory of 2916 2660 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 28 PID 2660 wrote to memory of 2916 2660 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 28 PID 2916 wrote to memory of 2596 2916 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 29 PID 2916 wrote to memory of 2596 2916 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 29 PID 2916 wrote to memory of 2596 2916 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 29 PID 2916 wrote to memory of 2596 2916 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 29 PID 2916 wrote to memory of 2596 2916 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 29 PID 2916 wrote to memory of 2596 2916 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 29 PID 2916 wrote to memory of 2596 2916 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 29 PID 2596 wrote to memory of 2396 2596 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 30 PID 2596 wrote to memory of 2396 2596 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 30 PID 2596 wrote to memory of 2396 2596 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 30 PID 2596 wrote to memory of 2396 2596 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 30 PID 2596 wrote to memory of 2396 2596 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 30 PID 2596 wrote to memory of 2396 2596 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 30 PID 2596 wrote to memory of 2396 2596 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe 30 PID 2396 wrote to memory of 2012 2396 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 31 PID 2396 wrote to memory of 2012 2396 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 31 PID 2396 wrote to memory of 2012 2396 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 31 PID 2396 wrote to memory of 2012 2396 14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp 31 PID 2012 wrote to memory of 1412 2012 mathparser.exe 32 PID 2012 wrote to memory of 1412 2012 mathparser.exe 32 PID 2012 wrote to memory of 1412 2012 mathparser.exe 32 PID 2012 wrote to memory of 1412 2012 mathparser.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe"C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\is-P7REO.tmp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp"C:\Users\Admin\AppData\Local\Temp\is-P7REO.tmp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp" /SL5="$50150,6104050,943104,C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe"C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe" /VERYSILENT3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\is-9F1LV.tmp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp"C:\Users\Admin\AppData\Local\Temp\is-9F1LV.tmp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp" /SL5="$60150,6104050,943104,C:\Users\Admin\AppData\Local\Temp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Roaming\mX Parser\mathparser.exe"C:\Users\Admin\AppData\Roaming\mX Parser\mathparser.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 2606⤵
- Loads dropped DLL
- Program crash
PID:1412
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\is-P7REO.tmp\14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196.tmp
Filesize3.1MB
MD510a0c7f88554ff904404989bb8a504ea
SHA1dc810dc1f2bf2dc37f69669e6c8e588943053a49
SHA256596b99105a085e245e744c4d0c49fd7260616c0849d80d485986f2773c387a4b
SHA5120a9b45796fb4b0d710d48fe1b730cefd4ccca9b9c16d627d5eb443b22661bb948151a7d6d478106196ef6e956d099b03c6d376abca2a32a7424ea6c2d5ff2dc4
-
Filesize
3.1MB
MD57052d63610b063c859af7f128a0c05cd
SHA17d44391b76368b8331c4f468f8ddbaf6ee5a6793
SHA2566e3917257f9239ff1c0ec0c17a7d9b6b01dead526c56218a11b0676174440112
SHA5128d34fdd4a48835b6db7ceda48716959e8c50bee04d10aa66044a880a78c13760cf314781f8e347644c5a2d71ff467577e431c70beaafcd52db72cb8044c9bc05
-
Filesize
5.9MB
MD55d735d8c7243f61a30f5e91539f76df9
SHA126474ba449682e82ca38fef32836dcb23ee24012
SHA256f00b523635707cf97be5877c9dea1abec7abf8d0e6bcce529cc96826344511a0
SHA512a7bc38389f8905bc98a3742243fa1fd810241908578656c509c022855aeb1c97b8a3519456488b9cdef3e8b64824f8d2bb48e846d5b0f63e3b7d38041220b13f