Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe
Resource
win10v2004-20240426-en
General
-
Target
e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe
-
Size
1.5MB
-
MD5
48a22c7ac1ef0e9628c1bfa48357f831
-
SHA1
ca0a75a7b765f971f916bdf1325676c8675e5d6a
-
SHA256
e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d
-
SHA512
456aeee30d7634402716ff9ebbf98f0084f76f1b5d701f4e46f82ec5e50a0592a9d13ad5b0d685b0228fbb264b8ddcecb74ad5ad343965b8e5846fce188c37b7
-
SSDEEP
3072:AfbbtGXRvjxCb5NgXDY7uSlkJcUa7kYQTcqW2NdQQGH/UDhSCUc4aqTB3Rt:EQlKgzelZNQSBQGH/CSpWqT
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened (read-only) \??\H: e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened (read-only) \??\I: e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened (read-only) \??\M: e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened (read-only) \??\N: e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened (read-only) \??\O: e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened (read-only) \??\G: e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened (read-only) \??\J: e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened (read-only) \??\K: e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened (read-only) \??\L: e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\RCX39D0.tmp e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File created C:\Program Files\7-Zip\7z.exe e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File created C:\Program Files\7-Zip\7zFM.exe e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened for modification C:\Program Files\7-Zip\7zFM.cab e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened for modification C:\Program Files\7-Zip\RCX39BF.tmp e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened for modification C:\Program Files\7-Zip\RCX39E1.tmp e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.cab e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\RCX39F2.tmp e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened for modification C:\Program Files\7-Zip\RCX39BE.tmp e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened for modification C:\Program Files\7-Zip\7z.exe e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\RCX39F3.tmp e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened for modification C:\Program Files\7-Zip\RCX39AD.tmp e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened for modification C:\Program Files\7-Zip\RCX39D1.tmp e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened for modification C:\Program Files\7-Zip\7z.cab e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File created C:\Program Files\7-Zip\7zFM.cab e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.cab e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File created C:\Program Files\readme.1xt e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe File created C:\Program Files\7-Zip\7z.cab e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1828 1888 WerFault.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe"C:\Users\Admin\AppData\Local\Temp\e84985b78f14812802817641c9a414c44f6c55111c666026a8548bddc2a0fa7d.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
PID:1888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 6882⤵
- Program crash
PID:1828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1888 -ip 18881⤵PID:3692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
930KB
MD530ac0b832d75598fb3ec37b6f2a8c86a
SHA16f47dbfd6ff36df7ba581a4cef024da527dc3046
SHA2561ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74
SHA512505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057
-
Filesize
224KB
MD533d7c95a4038e873f5dcdda7c93bd173
SHA1ef623f4f17d8d1624d05ad4491999c2d8622e11e
SHA256c27ed959d0a6748a7ccc854f9b5337f707548ef9839d0236882d345aa408a5a0
SHA512a32da80f81aaced241fdfae09cd48cebee92a419ff2f80c9937d172cce5c75ad36a0cbbe529fa6fae8ac74f42e310103f426987d6f791ddc80095c8a9c852050
-
Filesize
2.1MB
MD5b8d69fa2755c3ab1f12f8866a8e2a4f7
SHA18e3cdfb20e158c2906323ba0094a18c7dd2aaf2d
SHA2567e0976036431640ae1d9f1c0b52bcea5dd37ef86cd3f5304dc8a96459d9483cd
SHA5125acac46068b331216978500f67a7fa5257bc5b05133fab6d88280b670ae4885ef2d5d1f531169b66bf1952e082f56b1ad2bc3901479b740f96c53ea405adda18