Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe
Resource
win10v2004-20240426-en
General
-
Target
ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe
-
Size
1.5MB
-
MD5
ae788af52f4741690ba82c29d7f2a4b5
-
SHA1
3b7a75e8d77b6f931ba0f73ad563b3cbe08f2686
-
SHA256
ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649
-
SHA512
c34221290dd54730d7492a93e4c3c03d2a0784e1fd2a8e7ef35517c3c6ee8ef6a68f9620b1ac1ecf15f1cea009598f4fe1aadf846e30a613f28bba58026a9a97
-
SSDEEP
6144:5afcEHI/prnm4y3NjTjuC8xOcxph2ueF/mNyB:8HIhnmn9jT8fCB
Malware Config
Signatures
-
Detects executables built or packed with MPress PE compressor 5 IoCs
resource yara_rule behavioral1/memory/2300-0-0x0000000000400000-0x000000000048A000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0002000000011c9b-15.dat INDICATOR_EXE_Packed_MPress behavioral1/files/0x0008000000015ceb-113.dat INDICATOR_EXE_Packed_MPress behavioral1/files/0x0009000000015d07-131.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2300-217-0x0000000000400000-0x000000000048A000-memory.dmp INDICATOR_EXE_Packed_MPress -
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened (read-only) \??\M: ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened (read-only) \??\G: ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened (read-only) \??\I: ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened (read-only) \??\J: ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened (read-only) \??\K: ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened (read-only) \??\L: ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened (read-only) \??\N: ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened (read-only) \??\O: ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened (read-only) \??\E: ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\7zFM.cab ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File created C:\Program Files\Google\Chrome\Application\chrome.exe ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1D3F.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\7-Zip\RCX1BFE.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.cab ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\RCX1C61.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1D50.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1D94.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File created C:\Program Files\7-Zip\7z.cab ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\DVD Maker\RCX1CF7.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File created C:\Program Files\Google\Chrome\Application\chrome.cab ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\7-Zip\RCX1BFC.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\DVD Maker\RCX1CC5.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1D40.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\RCX1C4E.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1D93.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\7-Zip\RCX1BFD.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File created C:\Program Files\DVD Maker\DVDMaker.exe ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1D3B.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1D53.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.cab ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\7-Zip\7z.exe ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\RCX1C63.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.cab ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\7-Zip\7zFM.cab ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.cab ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\RCX1C3E.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.cab ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1D3C.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1D3E.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\RCX1E02.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.exe ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1D29.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File created C:\Program Files\readme.1xt ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\RCX1C62.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.cab ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File created C:\Program Files\7-Zip\7zFM.exe ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1D51.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\RCX1E03.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\7-Zip\RCX1BEC.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File created C:\Program Files\DVD Maker\DVDMaker.cab ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\7-Zip\7z.cab ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\7-Zip\RCX1B8D.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\RCX1C64.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.cab ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\DVD Maker\RCX1CD6.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\DVD Maker\RCX1CD7.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.cab ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\DVD Maker\RCX1CC4.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.cab ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1D3A.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1D52.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File created C:\Program Files\7-Zip\7z.exe ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File opened for modification C:\Program Files\7-Zip\RCX1B7C.tmp ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1936 2300 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1936 2300 ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe 28 PID 2300 wrote to memory of 1936 2300 ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe 28 PID 2300 wrote to memory of 1936 2300 ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe 28 PID 2300 wrote to memory of 1936 2300 ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe 28 PID 2300 wrote to memory of 1936 2300 ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe 28 PID 2300 wrote to memory of 1936 2300 ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe 28 PID 2300 wrote to memory of 1936 2300 ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe"C:\Users\Admin\AppData\Local\Temp\ffd4012e3ba8ca2043b17adefed3f079bc58f58beba3496b77297c5f3b035649.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 8162⤵
- Program crash
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
1.5MB
MD561686295b7eb7471071f19f3d246f4e4
SHA1b6251855d891c132148bc07cc93624931507e8b3
SHA25649e6fc0db7587a5728fb78e93dfb3bb74ebe054d1ce0aa1f27a18327b4abc5f2
SHA512b4b85f18f5a04642b2f8c405e194ebe05062bf1e2061fe6480de4b348efb590d4f39fdf9451412fc6f2c29b5abceed926bd1e36d0ce80c8e37688194a1e0713d
-
Filesize
930KB
MD530ac0b832d75598fb3ec37b6f2a8c86a
SHA16f47dbfd6ff36df7ba581a4cef024da527dc3046
SHA2561ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74
SHA512505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057
-
Filesize
188KB
MD5f03cd3c73a4d56421c60e6f2a40a9ef2
SHA13e7b8c15ba83c23333740af3aa4c4b3066fe5173
SHA25644fc47dc280a196cc49849cfb770030f1525758ba266330b6232ee60fb4fe642
SHA512ba57d32ffe4d0ecca137aed733c1471b4663dcba07a4c4fffcffc008a051de86fd8561bdd93d5fff545bf1865c8b5ac71eae31d20228727f5c1a46f2f9a6390e
-
Filesize
906KB
MD584ff6c209447a056e22a29806bfa2c96
SHA121190928955094c44ad996f26c801b46437809cc
SHA256d2072ffe011341ec2a3c4af9f93b06deffa92fa05120c45dbb3ad5635f3e57b1
SHA5126493dfbe43887e6a588ef067960ddb9e9798e07bb14fd73abf99acc5ee63250858c86d70a926f009f466bf6fedb7ca43bbecf7fc2433e47704527c2d0b6b01d9
-
Filesize
2.2MB
MD5e83d2495d5867e224fbf42ef40d8856c
SHA1fec908e0e7bc469875ab8f68d936225c635a6ac2
SHA2562c806d9b932f24c4bc84e86ced7962a75c0161ff732f77eb1827a3a14976b2c1
SHA512e22f36cb40fff2672e9e49aa991656a0cc1188c7ba2583efae2d238a4e864bd5f8bdc532a5c35285ca2b4b105097454eb06d5860c41e618c44bab6e300408b8d
-
Filesize
2.2MB
MD5f56161efdeee267a188bb1800c725c04
SHA19f5cf40f112be8cc27fd10186bfa9b58191e36c2
SHA256dc3fcaf700b8105152f362d6b32ad161289753f8a55039eeea81cfcbd6ddff4d
SHA51227f3928be8380909c4b83578d2adf1b0fa3677f494a83585ad2db5a41ee1319bc205bd97f2180253ca30503200934284471043d7eebd86acf3bbc27219e92398
-
Filesize
1.6MB
MD5527e039ba9add8a7fac3a6bc30a6d476
SHA1729a329265eda72cada039c1941e7c672addfc19
SHA2564b8a72fc81b733ed2e6e70d4c5401f954002783dbf14927849ad579860780b94
SHA5129e73e14e33a5f07a87e9c1fecfdaee09d1408471052aacfde3d1e877dad4d253b525ebefca6bddabc23cf81d8dcce0785aedcc2f135d171ecbb1feaeb922c449
-
Filesize
168KB
MD5d31d478c87649a0046cc621224c46452
SHA1da7e366a1b7845297626b51c634b41c94b6aa625
SHA256ab8be413ba59162d4e071a9bee080aacdf344975c463e8d257430481be6a22a3
SHA512ddd7e87d69c1fed4ae1ca10128f638d22895184048dec52a346f588e07992ebf2f07945745bda0db886f4c52868b3dde7c394a3a984a6caeffc96d94307a7d1a
-
Filesize
2.8MB
MD5095092f4e746810c5829038d48afd55a
SHA1246eb3d41194dddc826049bbafeb6fc522ec044a
SHA2562f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588
SHA5127f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400
-
Filesize
1.5MB
MD57297bb04433b6bf92d6b3144e149f2f1
SHA138fdd923c91dbc1c281dd03de89ba988c02796d6
SHA2566f6a56db6b0f1832e4d85e848a75af3581d4565333e284bc6c86d4f0a8c538a0
SHA512df6e21f232a8c5b1c35437d2273d1ff6ac5dae1b18d42d4bb5fed027be40d21b3cb3e51f4064e8a03082c5f370f2098fa0b5a1e0523d8b4abf6ec141e2f6ba4d
-
Filesize
1020KB
MD5b65d7344b0a7faa207d2e1a7adaafb60
SHA1755ad15b1745b0e730d658d4a92e2b754425b7db
SHA256f4b91fbbcba8a46eefe4965e4a24c6ede3decbd1fec96e141a1953173efd1c92
SHA512f17ac73c2df7c73a31b11ce0f533d6db91bdb0cdeea653dcd52ac72c3cf28da0c236b79586ddc7a6c825fdd171290722f888465e776f12ac2cae75be82726b22