Analysis
-
max time kernel
23s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
sdcheck/SeedsChecker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sdcheck/SeedsChecker.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
sdcheck/module.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
sdcheck/module.exe
Resource
win10v2004-20240508-en
General
-
Target
sdcheck/SeedsChecker.exe
-
Size
10.5MB
-
MD5
5f7e0d25b165b9afcc3e6ca2bb135a47
-
SHA1
72cbc2583a2dd5078a0edb83b153f38fb5ddb085
-
SHA256
b94bb64c9f1e39f900c095b2034d3302a2a1cfeca08096ac71ecd24b5a25c61d
-
SHA512
fd87ba28b3cd39b7938eba27d95588cacb51dd3e46c5f79282f3a2693e78387c1032b58b1186eae052a4d33680863c609588888dff46a3fb2542860eda4329fc
-
SSDEEP
196608:BVE0qzgg7MlG6g4kpQbjHqsQLTJeriQAu8VAbC7EzpIjtoTSam0nuYaf:BV5qz7J6gKbjq1d4iFuE+CQzpI2+l0nu
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
EUgNJfrbZv.exeSeedsChecker (1).exepid process 1760 EUgNJfrbZv.exe 2916 SeedsChecker (1).exe -
Loads dropped DLL 4 IoCs
Processes:
SeedsChecker.exeWerFault.exepid process 1300 SeedsChecker.exe 2512 WerFault.exe 2512 WerFault.exe 2512 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
SeedsChecker.exeSeedsChecker (1).exeEUgNJfrbZv.exedescription pid process target process PID 1300 wrote to memory of 1760 1300 SeedsChecker.exe EUgNJfrbZv.exe PID 1300 wrote to memory of 1760 1300 SeedsChecker.exe EUgNJfrbZv.exe PID 1300 wrote to memory of 1760 1300 SeedsChecker.exe EUgNJfrbZv.exe PID 1300 wrote to memory of 2916 1300 SeedsChecker.exe SeedsChecker (1).exe PID 1300 wrote to memory of 2916 1300 SeedsChecker.exe SeedsChecker (1).exe PID 1300 wrote to memory of 2916 1300 SeedsChecker.exe SeedsChecker (1).exe PID 2916 wrote to memory of 2512 2916 SeedsChecker (1).exe WerFault.exe PID 2916 wrote to memory of 2512 2916 SeedsChecker (1).exe WerFault.exe PID 2916 wrote to memory of 2512 2916 SeedsChecker (1).exe WerFault.exe PID 1760 wrote to memory of 2560 1760 EUgNJfrbZv.exe WerFault.exe PID 1760 wrote to memory of 2560 1760 EUgNJfrbZv.exe WerFault.exe PID 1760 wrote to memory of 2560 1760 EUgNJfrbZv.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe"C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe"C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1760 -s 5203⤵PID:2560
-
-
-
C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe"C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2916 -s 923⤵
- Loads dropped DLL
PID:2512
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD56ff8156ec6df07062b3a9f9594604a2b
SHA1608adce74f2461d853aa5dc7590dec9daa948019
SHA2561fddeef51fb61303fcd232c0d7bd9bb45cf9d7b6a4377d8ccb479ae562ae79be
SHA512f40aae3ead07bcdcc7ddd0e4800026b0f9a6f50b6f1f1338ada10d63c05eb6ec0d33cfa507227c0ff46ba63193014d73e6eadc03edd31490ee982546ad64aada
-
Filesize
10.5MB
MD52ebfecade19e4b41e1968a8b5e49f163
SHA12e419a0dd67f1532ce71091f3623f992ce94c21c
SHA2566851f7b4b2fc51091056aeca5616be222cf212196bef0af705ee73ff068d94e2
SHA5120e105a0b503abb526817aa982d2b709b1cfdc044aa01fd93613a8cc3ed96b4c772474099bbd66be00af2873760adbecf940fe65228f5aa085443492bb509fa1f