Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 18:08
Static task
static1
Behavioral task
behavioral1
Sample
02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe
Resource
win10v2004-20240508-en
General
-
Target
02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe
-
Size
614KB
-
MD5
57f9d870b05d59a7e79816ef5e8fe70e
-
SHA1
e5f2d86139d9a847663b2cd0c68716e85678177d
-
SHA256
02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e
-
SHA512
9dc3849575caa0337645f7f24d4d7720375857875a26dad839512de6aa3dc2d49f7bbf2138c7c09aa94e37ce94b0f1f370eafca3bc89faba46bd13b1073f40c2
-
SSDEEP
12288:6jLIHe+qdOqQ/H6OKnA5feEq8sdvuxi+vC/tKJ+2BAMSsjgZeS1I/XUta93poy:CRtwtvagbCy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
D5HYAA6YQ9.exepid process 2164 D5HYAA6YQ9.exe -
Loads dropped DLL 5 IoCs
Processes:
02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exeWerFault.exepid process 1652 02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe 1652 02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2608 2164 WerFault.exe D5HYAA6YQ9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exeD5HYAA6YQ9.exedescription pid process target process PID 1652 wrote to memory of 2164 1652 02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe D5HYAA6YQ9.exe PID 1652 wrote to memory of 2164 1652 02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe D5HYAA6YQ9.exe PID 1652 wrote to memory of 2164 1652 02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe D5HYAA6YQ9.exe PID 1652 wrote to memory of 2164 1652 02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe D5HYAA6YQ9.exe PID 2164 wrote to memory of 2608 2164 D5HYAA6YQ9.exe WerFault.exe PID 2164 wrote to memory of 2608 2164 D5HYAA6YQ9.exe WerFault.exe PID 2164 wrote to memory of 2608 2164 D5HYAA6YQ9.exe WerFault.exe PID 2164 wrote to memory of 2608 2164 D5HYAA6YQ9.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe"C:\Users\Admin\AppData\Local\Temp\02752953a097c95cf337c77af8ec8f4526983138e1e0cf07e0ad1ed7be885c2e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\D5HYAA6YQ9.exe"C:\ProgramData\D5HYAA6YQ9.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 8083⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\ProgramData\D5HYAA6YQ9.exeFilesize
159KB
MD514878fb96760ba869271109d832f43a7
SHA1874f6bcac3ef5682a567483ea5627d38bfbffa8d
SHA2560c816842e7a1649f0010b7c437a7783f82fd8a62a080adaeaecd871e6578c721
SHA512f882cfb373f79e823e3284b6dbe09d7df0ea90d0ab20e9399e1ee3af86eec2e8ba5c3b882f6b7f88b0478bc3fdfe05e033ee6fcbc2813faf13558fbec1d0a2e2
-
memory/1652-0-0x000000007429E000-0x000000007429F000-memory.dmpFilesize
4KB
-
memory/1652-1-0x0000000000AD0000-0x0000000000B6E000-memory.dmpFilesize
632KB
-
memory/1652-3-0x0000000074290000-0x000000007497E000-memory.dmpFilesize
6.9MB
-
memory/1652-12-0x0000000002010000-0x000000000204D000-memory.dmpFilesize
244KB
-
memory/1652-11-0x0000000002010000-0x000000000204D000-memory.dmpFilesize
244KB
-
memory/1652-15-0x0000000074290000-0x000000007497E000-memory.dmpFilesize
6.9MB
-
memory/2164-14-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB