Analysis
-
max time kernel
157s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe
Resource
win10v2004-20240226-en
General
-
Target
01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe
-
Size
7.0MB
-
MD5
771a4b5986aaa12e52cc75520c7acf8d
-
SHA1
a3f4495de0a3d1a48aab836c55602f680f0a4675
-
SHA256
01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053
-
SHA512
6cac997ffb897bbd519c8969ba53fc5b9eccd3cecc386adfd9438ce22c78ab0135a0a4d0121f4582f29c35c39f5c50e008d23fbecc1beb8f2058be9ee434be80
-
SSDEEP
196608:kU35rF8HXJpD34NIJtYJVeW1ZL3t7vYEF0r7Dbl:T/Aj4NIvkx3t7vYvvDbl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 460 01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe.tmp 1672 immpplayer32.exe -
Loads dropped DLL 3 IoCs
pid Process 460 01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe.tmp 460 01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe.tmp 460 01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
pid pid_target Process procid_target 3572 1672 WerFault.exe 93 4392 1672 WerFault.exe 93 4380 1672 WerFault.exe 93 3488 1672 WerFault.exe 93 2088 1672 WerFault.exe 93 4460 1672 WerFault.exe 93 3584 1672 WerFault.exe 93 796 1672 WerFault.exe 93 5024 1672 WerFault.exe 93 4840 1672 WerFault.exe 93 1348 1672 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1672 immpplayer32.exe 1672 immpplayer32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2368 wrote to memory of 460 2368 01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe 90 PID 2368 wrote to memory of 460 2368 01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe 90 PID 2368 wrote to memory of 460 2368 01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe 90 PID 460 wrote to memory of 4760 460 01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe.tmp 91 PID 460 wrote to memory of 4760 460 01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe.tmp 91 PID 460 wrote to memory of 4760 460 01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe.tmp 91 PID 460 wrote to memory of 1672 460 01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe.tmp 93 PID 460 wrote to memory of 1672 460 01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe.tmp 93 PID 460 wrote to memory of 1672 460 01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe.tmp 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe"C:\Users\Admin\AppData\Local\Temp\01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\is-IMC43.tmp\01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe.tmp"C:\Users\Admin\AppData\Local\Temp\is-IMC43.tmp\01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe.tmp" /SL5="$C003C,7114651,53248,C:\Users\Admin\AppData\Local\Temp\01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Delete /F /TN "IMMP_Audio_Player_4192"3⤵PID:4760
-
-
C:\Users\Admin\AppData\Local\IMMP Audio Player\immpplayer32.exe"C:\Users\Admin\AppData\Local\IMMP Audio Player\immpplayer32.exe" 9352263ac5d79bad984e0ef60869242c3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 8964⤵
- Program crash
PID:3572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 9044⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 8964⤵
- Program crash
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 10924⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 11844⤵
- Program crash
PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 12364⤵
- Program crash
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 12564⤵
- Program crash
PID:3584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 13364⤵
- Program crash
PID:796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 13724⤵
- Program crash
PID:5024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 9084⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 9044⤵
- Program crash
PID:1348
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1672 -ip 16721⤵PID:876
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3696 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:2692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1672 -ip 16721⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1672 -ip 16721⤵PID:1364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1672 -ip 16721⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1672 -ip 16721⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1672 -ip 16721⤵PID:1936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1672 -ip 16721⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1672 -ip 16721⤵PID:3896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1672 -ip 16721⤵PID:2344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1672 -ip 16721⤵PID:2688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1672 -ip 16721⤵PID:4784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD59ff3213677cfc8a82cd45f3ab560a321
SHA1c68823431d5846b2827116eff1bd39807b136f5c
SHA256a8573dc6938668588e362c9b8fcb2812510461be9d6e7f0d81542dd6e21082ec
SHA5128d97620749385edcb1f78a5472e2828fed0244b0dbc930065f3ff6adc4b3ce153644a4a7dbd27e3df4501624b8828e2400b3427762980189391c2a15026ecff4
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
C:\Users\Admin\AppData\Local\Temp\is-IMC43.tmp\01d767441fb213034c9765381fac414859030eb3e47831751aa2eea054eb2053.exe.tmp
Filesize666KB
MD5bdfb2b7cc3577e4d8333ed3a084d7331
SHA18497df4d32157d12d710325f653eca937d586006
SHA2568daa2613d4bfe79cebdc5d3546e40788f1f4677a5311a3e3e1dff6b79e0ed69a
SHA5127dd208d37d58923f374f6894c0e8170f35d7ea019e62f40383052f69d403eef9b79a9cb6d19a5afece1d907cccab048d92516146ebe2f0368d1f5e145f7c5ed9