Analysis
-
max time kernel
131s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
fbmeuulx.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
fbmeuulx.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
mcqocqj.vbs
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
mcqocqj.vbs
Resource
win10v2004-20240426-en
General
-
Target
ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe
-
Size
789KB
-
MD5
eb64fe37f72eab5a4574ad6e6cc1adaa
-
SHA1
8e910f4f16462cdd0b39c1c01affbaa18c8cb843
-
SHA256
ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b
-
SHA512
96833b022b2a2df6627ed81107b6b47274c3ddf7510a23421a546cf75d9c29349a93fba0c43dec89a9336fa5f24e62d8d968a29aadac1b59c4783483314fd034
-
SSDEEP
12288:mb/JSOI/Q4xrEHZKLzorUs1Ag9CACJ3aZKDOcNA5av+BjgAC7Rt:mb/Jc/1xoHcLzorUsXQAKZNA46jgPdt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3600 fbmeuulx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 364 3600 WerFault.exe 83 -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3600 fbmeuulx.exe 3600 fbmeuulx.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3600 fbmeuulx.exe 3600 fbmeuulx.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2156 wrote to memory of 3600 2156 ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe 83 PID 2156 wrote to memory of 3600 2156 ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe 83 PID 2156 wrote to memory of 3600 2156 ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe"C:\Users\Admin\AppData\Local\Temp\ce9ebdfa3a6a663782c92e9e2fe960441acca18a1d5d5cd23cdd603a4168d11b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe"C:\Users\Admin\AppData\Local\Temp\fbmeuulx.exe" "C:\Users\Admin\AppData\Local\Temp\mcqocqj.au3"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 6843⤵
- Program crash
PID:364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3600 -ip 36001⤵PID:1240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
Filesize
36KB
MD5d8100f9de29dfa203c4a1ff41c29aac5
SHA1c08029b02e5ad1df414cb21672232fafe926fa51
SHA256a2dbdff0e9afe0d8427588a852c923cbd413589ad316dacc9fbdf1d2bd066339
SHA512fb1f3508ae26219ea0f116c45e33909e78ef4c1db491bfc01651ba3ef9b42befc3489280dfd25a0b227bf2edd5fe469c09f9a118d61613255cc83c235904dac5
-
Filesize
5KB
MD59eb5ddcba5e1de74356e222128db0f96
SHA1a1e1df2fa35df960196df1ee02aa7cf73a9a9445
SHA256bf492d5d5518b3dc2b7fa10eccf675f658d667e58065cf5c670e7b8c1dc98f26
SHA512b34a543362926488ca05ec8061794ed4c29eda8ed8b10dc07a639ce7ec47d9f05608c69d01dc3935a12c012b6ae04afe3914a755844e8c7c5e21fa9c85d5fe8c
-
Filesize
296KB
MD53c6d97d0817a720b9b7f9c021ad9b86c
SHA1fbd1b8e3ca77864ee2396a203ebd05a22c9b7014
SHA256f32b02790159c054ed3472a5f0933f667af223e60fcd5fadc416bb06a9332543
SHA512b3c82be4f8c6b20316d2a3af33d125dbadeace8a67928725b2405995cc9f44193b9e599f815562290ee240e78f46e3c98aafd155da1b5e7edd7f5726881493fb