Analysis

  • max time kernel
    66s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-04-2024 01:54

General

  • Target

    d00b85b408b52021ba6658e03dd89b2c6f293506ab6c41d1db70c8a4c2501961.exe

  • Size

    1.1MB

  • MD5

    0871ed5985caef1e06b70d786c1a7ffb

  • SHA1

    f4ed7f9cced6c2a3e9139429968bbe6dd9e5ca34

  • SHA256

    d00b85b408b52021ba6658e03dd89b2c6f293506ab6c41d1db70c8a4c2501961

  • SHA512

    baf57c851021914595370e56cf5d4f0c09c8093d8068f257934af7c912f72e38444dba4fccb55c47201606ca65055a80e31a5080c2b4038c02e52964698abd1e

  • SSDEEP

    24576:/qDEvCTbMWu7rQYlBQcBiT6rprG8av1S94C1lOl7NQJ:/TvC/MTQYxsWR7av1S2H7y

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d00b85b408b52021ba6658e03dd89b2c6f293506ab6c41d1db70c8a4c2501961.exe
    "C:\Users\Admin\AppData\Local\Temp\d00b85b408b52021ba6658e03dd89b2c6f293506ab6c41d1db70c8a4c2501961.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Users\Admin\AppData\Local\Temp\d00b85b408b52021ba6658e03dd89b2c6f293506ab6c41d1db70c8a4c2501961.exe"
      2⤵
        PID:4880
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 736
        2⤵
        • Program crash
        PID:4884
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2164 -ip 2164
      1⤵
        PID:3924

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\aut3E41.tmp

        Filesize

        262KB

        MD5

        0407b38187453c8deb97741765baaff3

        SHA1

        70b30727e0ff3f42e50d111cf758f92a18b0078b

        SHA256

        78b0c2a9f68ed73ec75cdd9b2b502736c2a7d0522eb278ba7c04108ef0813238

        SHA512

        8438242ffc60317db22cbc0146fc281a7235be4d3773998f9bfa7607eb0c25c7959eeb50d900152f66bd06994dab989f8f9176fa5c35c3103da75fa0a7137a71

      • memory/2164-12-0x0000000001170000-0x0000000001174000-memory.dmp

        Filesize

        16KB