Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
fbmeuulx.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
fbmeuulx.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
mcqocqj.vbs
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
mcqocqj.vbs
Resource
win10v2004-20240426-en
General
-
Target
ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe
-
Size
789KB
-
MD5
eb64fe37f72eab5a4574ad6e6cc1adaa
-
SHA1
8e910f4f16462cdd0b39c1c01affbaa18c8cb843
-
SHA256
ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b
-
SHA512
96833b022b2a2df6627ed81107b6b47274c3ddf7510a23421a546cf75d9c29349a93fba0c43dec89a9336fa5f24e62d8d968a29aadac1b59c4783483314fd034
-
SSDEEP
12288:mb/JSOI/Q4xrEHZKLzorUs1Ag9CACJ3aZKDOcNA5av+BjgAC7Rt:mb/Jc/1xoHcLzorUsXQAKZNA46jgPdt
Malware Config
Signatures
-
Executes dropped EXE 15 IoCs
pid Process 2320 fbmeuulx.exe 2496 fbmeuulx.exe 2576 fbmeuulx.exe 2608 fbmeuulx.exe 2580 fbmeuulx.exe 2512 fbmeuulx.exe 2400 fbmeuulx.exe 2604 fbmeuulx.exe 2428 fbmeuulx.exe 2420 fbmeuulx.exe 2524 fbmeuulx.exe 2284 fbmeuulx.exe 2392 fbmeuulx.exe 2412 fbmeuulx.exe 2468 fbmeuulx.exe -
Loads dropped DLL 20 IoCs
pid Process 1924 ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe 2320 fbmeuulx.exe 2320 fbmeuulx.exe 2320 fbmeuulx.exe 2320 fbmeuulx.exe 2320 fbmeuulx.exe 2320 fbmeuulx.exe 2320 fbmeuulx.exe 2320 fbmeuulx.exe 2320 fbmeuulx.exe 2320 fbmeuulx.exe 2320 fbmeuulx.exe 2320 fbmeuulx.exe 2320 fbmeuulx.exe 2320 fbmeuulx.exe 2896 WerFault.exe 2896 WerFault.exe 2896 WerFault.exe 2896 WerFault.exe 2896 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 2896 2320 WerFault.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2320 fbmeuulx.exe 2320 fbmeuulx.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2320 fbmeuulx.exe 2320 fbmeuulx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2320 1924 ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe 28 PID 1924 wrote to memory of 2320 1924 ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe 28 PID 1924 wrote to memory of 2320 1924 ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe 28 PID 1924 wrote to memory of 2320 1924 ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe 28 PID 2320 wrote to memory of 2496 2320 fbmeuulx.exe 29 PID 2320 wrote to memory of 2496 2320 fbmeuulx.exe 29 PID 2320 wrote to memory of 2496 2320 fbmeuulx.exe 29 PID 2320 wrote to memory of 2496 2320 fbmeuulx.exe 29 PID 2320 wrote to memory of 2576 2320 fbmeuulx.exe 30 PID 2320 wrote to memory of 2576 2320 fbmeuulx.exe 30 PID 2320 wrote to memory of 2576 2320 fbmeuulx.exe 30 PID 2320 wrote to memory of 2576 2320 fbmeuulx.exe 30 PID 2320 wrote to memory of 2608 2320 fbmeuulx.exe 31 PID 2320 wrote to memory of 2608 2320 fbmeuulx.exe 31 PID 2320 wrote to memory of 2608 2320 fbmeuulx.exe 31 PID 2320 wrote to memory of 2608 2320 fbmeuulx.exe 31 PID 2320 wrote to memory of 2580 2320 fbmeuulx.exe 32 PID 2320 wrote to memory of 2580 2320 fbmeuulx.exe 32 PID 2320 wrote to memory of 2580 2320 fbmeuulx.exe 32 PID 2320 wrote to memory of 2580 2320 fbmeuulx.exe 32 PID 2320 wrote to memory of 2512 2320 fbmeuulx.exe 33 PID 2320 wrote to memory of 2512 2320 fbmeuulx.exe 33 PID 2320 wrote to memory of 2512 2320 fbmeuulx.exe 33 PID 2320 wrote to memory of 2512 2320 fbmeuulx.exe 33 PID 2320 wrote to memory of 2400 2320 fbmeuulx.exe 34 PID 2320 wrote to memory of 2400 2320 fbmeuulx.exe 34 PID 2320 wrote to memory of 2400 2320 fbmeuulx.exe 34 PID 2320 wrote to memory of 2400 2320 fbmeuulx.exe 34 PID 2320 wrote to memory of 2604 2320 fbmeuulx.exe 35 PID 2320 wrote to memory of 2604 2320 fbmeuulx.exe 35 PID 2320 wrote to memory of 2604 2320 fbmeuulx.exe 35 PID 2320 wrote to memory of 2604 2320 fbmeuulx.exe 35 PID 2320 wrote to memory of 2428 2320 fbmeuulx.exe 36 PID 2320 wrote to memory of 2428 2320 fbmeuulx.exe 36 PID 2320 wrote to memory of 2428 2320 fbmeuulx.exe 36 PID 2320 wrote to memory of 2428 2320 fbmeuulx.exe 36 PID 2320 wrote to memory of 2420 2320 fbmeuulx.exe 37 PID 2320 wrote to memory of 2420 2320 fbmeuulx.exe 37 PID 2320 wrote to memory of 2420 2320 fbmeuulx.exe 37 PID 2320 wrote to memory of 2420 2320 fbmeuulx.exe 37 PID 2320 wrote to memory of 2524 2320 fbmeuulx.exe 38 PID 2320 wrote to memory of 2524 2320 fbmeuulx.exe 38 PID 2320 wrote to memory of 2524 2320 fbmeuulx.exe 38 PID 2320 wrote to memory of 2524 2320 fbmeuulx.exe 38 PID 2320 wrote to memory of 2284 2320 fbmeuulx.exe 39 PID 2320 wrote to memory of 2284 2320 fbmeuulx.exe 39 PID 2320 wrote to memory of 2284 2320 fbmeuulx.exe 39 PID 2320 wrote to memory of 2284 2320 fbmeuulx.exe 39 PID 2320 wrote to memory of 2392 2320 fbmeuulx.exe 40 PID 2320 wrote to memory of 2392 2320 fbmeuulx.exe 40 PID 2320 wrote to memory of 2392 2320 fbmeuulx.exe 40 PID 2320 wrote to memory of 2392 2320 fbmeuulx.exe 40 PID 2320 wrote to memory of 2412 2320 fbmeuulx.exe 41 PID 2320 wrote to memory of 2412 2320 fbmeuulx.exe 41 PID 2320 wrote to memory of 2412 2320 fbmeuulx.exe 41 PID 2320 wrote to memory of 2412 2320 fbmeuulx.exe 41 PID 2320 wrote to memory of 2468 2320 fbmeuulx.exe 42 PID 2320 wrote to memory of 2468 2320 fbmeuulx.exe 42 PID 2320 wrote to memory of 2468 2320 fbmeuulx.exe 42 PID 2320 wrote to memory of 2468 2320 fbmeuulx.exe 42 PID 2320 wrote to memory of 2896 2320 fbmeuulx.exe 43 PID 2320 wrote to memory of 2896 2320 fbmeuulx.exe 43 PID 2320 wrote to memory of 2896 2320 fbmeuulx.exe 43 PID 2320 wrote to memory of 2896 2320 fbmeuulx.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe"C:\Users\Admin\AppData\Local\Temp\ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe"C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe" "C:\Users\Admin\AppData\Local\Temp\mcqocqj.au3"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe"C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe" "C:\Users\Admin\AppData\Local\Temp\mcqocqj.au3"3⤵
- Executes dropped EXE
PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe"C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe" "C:\Users\Admin\AppData\Local\Temp\mcqocqj.au3"3⤵
- Executes dropped EXE
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe"C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe" "C:\Users\Admin\AppData\Local\Temp\mcqocqj.au3"3⤵
- Executes dropped EXE
PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe"C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe" "C:\Users\Admin\AppData\Local\Temp\mcqocqj.au3"3⤵
- Executes dropped EXE
PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe"C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe" "C:\Users\Admin\AppData\Local\Temp\mcqocqj.au3"3⤵
- Executes dropped EXE
PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe"C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe" "C:\Users\Admin\AppData\Local\Temp\mcqocqj.au3"3⤵
- Executes dropped EXE
PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe"C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe" "C:\Users\Admin\AppData\Local\Temp\mcqocqj.au3"3⤵
- Executes dropped EXE
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe"C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe" "C:\Users\Admin\AppData\Local\Temp\mcqocqj.au3"3⤵
- Executes dropped EXE
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe"C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe" "C:\Users\Admin\AppData\Local\Temp\mcqocqj.au3"3⤵
- Executes dropped EXE
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe"C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe" "C:\Users\Admin\AppData\Local\Temp\mcqocqj.au3"3⤵
- Executes dropped EXE
PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe"C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe" "C:\Users\Admin\AppData\Local\Temp\mcqocqj.au3"3⤵
- Executes dropped EXE
PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe"C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe" "C:\Users\Admin\AppData\Local\Temp\mcqocqj.au3"3⤵
- Executes dropped EXE
PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe"C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe" "C:\Users\Admin\AppData\Local\Temp\mcqocqj.au3"3⤵
- Executes dropped EXE
PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe"C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe" "C:\Users\Admin\AppData\Local\Temp\mcqocqj.au3"3⤵
- Executes dropped EXE
PID:2468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 3123⤵
- Loads dropped DLL
- Program crash
PID:2896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
Filesize
36KB
MD5d8100f9de29dfa203c4a1ff41c29aac5
SHA1c08029b02e5ad1df414cb21672232fafe926fa51
SHA256a2dbdff0e9afe0d8427588a852c923cbd413589ad316dacc9fbdf1d2bd066339
SHA512fb1f3508ae26219ea0f116c45e33909e78ef4c1db491bfc01651ba3ef9b42befc3489280dfd25a0b227bf2edd5fe469c09f9a118d61613255cc83c235904dac5
-
Filesize
5KB
MD59eb5ddcba5e1de74356e222128db0f96
SHA1a1e1df2fa35df960196df1ee02aa7cf73a9a9445
SHA256bf492d5d5518b3dc2b7fa10eccf675f658d667e58065cf5c670e7b8c1dc98f26
SHA512b34a543362926488ca05ec8061794ed4c29eda8ed8b10dc07a639ce7ec47d9f05608c69d01dc3935a12c012b6ae04afe3914a755844e8c7c5e21fa9c85d5fe8c
-
Filesize
296KB
MD53c6d97d0817a720b9b7f9c021ad9b86c
SHA1fbd1b8e3ca77864ee2396a203ebd05a22c9b7014
SHA256f32b02790159c054ed3472a5f0933f667af223e60fcd5fadc416bb06a9332543
SHA512b3c82be4f8c6b20316d2a3af33d125dbadeace8a67928725b2405995cc9f44193b9e599f815562290ee240e78f46e3c98aafd155da1b5e7edd7f5726881493fb