Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:26
Static task
static1
Behavioral task
behavioral1
Sample
41b5e85ab8c407460bbb50719b35a0c24ed96d55dc693bfeba22b51655c1bfe1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
41b5e85ab8c407460bbb50719b35a0c24ed96d55dc693bfeba22b51655c1bfe1.exe
Resource
win10v2004-20240426-en
General
-
Target
41b5e85ab8c407460bbb50719b35a0c24ed96d55dc693bfeba22b51655c1bfe1.exe
-
Size
3.6MB
-
MD5
33e88e1078cdfe642cad5a2dd963210c
-
SHA1
c69d65902dd41e28684b3f8069b47b39da64e645
-
SHA256
41b5e85ab8c407460bbb50719b35a0c24ed96d55dc693bfeba22b51655c1bfe1
-
SHA512
165e89964f5e7efb59c65e065c48c6c8735d9a3b6d3d7151d7305e014c22c250a19fceabbbccd66112ae15e98763b1502286cc776d071d3f3ab2172b9ff360c9
-
SSDEEP
98304:9VabsRU9PaN5SaaT1clgYlF92hI0fm2ezt:9VabsW9PaN5SaaRigYlFaS2
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
41b5e85ab8c407460bbb50719b35a0c24ed96d55dc693bfeba22b51655c1bfe1.exepid process 2928 41b5e85ab8c407460bbb50719b35a0c24ed96d55dc693bfeba22b51655c1bfe1.exe 2928 41b5e85ab8c407460bbb50719b35a0c24ed96d55dc693bfeba22b51655c1bfe1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
41b5e85ab8c407460bbb50719b35a0c24ed96d55dc693bfeba22b51655c1bfe1.exedescription pid process Token: SeDebugPrivilege 2928 41b5e85ab8c407460bbb50719b35a0c24ed96d55dc693bfeba22b51655c1bfe1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
41b5e85ab8c407460bbb50719b35a0c24ed96d55dc693bfeba22b51655c1bfe1.exedescription pid process target process PID 2928 wrote to memory of 1716 2928 41b5e85ab8c407460bbb50719b35a0c24ed96d55dc693bfeba22b51655c1bfe1.exe WerFault.exe PID 2928 wrote to memory of 1716 2928 41b5e85ab8c407460bbb50719b35a0c24ed96d55dc693bfeba22b51655c1bfe1.exe WerFault.exe PID 2928 wrote to memory of 1716 2928 41b5e85ab8c407460bbb50719b35a0c24ed96d55dc693bfeba22b51655c1bfe1.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41b5e85ab8c407460bbb50719b35a0c24ed96d55dc693bfeba22b51655c1bfe1.exe"C:\Users\Admin\AppData\Local\Temp\41b5e85ab8c407460bbb50719b35a0c24ed96d55dc693bfeba22b51655c1bfe1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2928 -s 6962⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2928-0-0x000007FEF59B3000-0x000007FEF59B4000-memory.dmpFilesize
4KB
-
memory/2928-1-0x0000000001370000-0x000000000170A000-memory.dmpFilesize
3.6MB
-
memory/2928-2-0x000007FEF59B0000-0x000007FEF639C000-memory.dmpFilesize
9.9MB
-
memory/2928-3-0x000007FEF59B3000-0x000007FEF59B4000-memory.dmpFilesize
4KB
-
memory/2928-4-0x000007FEF59B0000-0x000007FEF639C000-memory.dmpFilesize
9.9MB