Analysis
-
max time kernel
136s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
965f5894b0caefdbbcceb5da730ab025.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
965f5894b0caefdbbcceb5da730ab025.exe
Resource
win10v2004-20240226-en
General
-
Target
965f5894b0caefdbbcceb5da730ab025.exe
-
Size
1.2MB
-
MD5
965f5894b0caefdbbcceb5da730ab025
-
SHA1
fc275e9aa8dc0200d6fc0855ef45931b7972e4c9
-
SHA256
33079a9135bbb33fcbce48358e267bf21c218fd3f86de19afd775b63d6ed11b1
-
SHA512
06cf470ee6be5ca162eb90f2982bd0d86dd08a8682cb7cef50e1c90f23856c6a655cb521a46ce09f97a1ec6294ba20fd2c01199df4d767df2249f91101df06f7
-
SSDEEP
24576:N7blAjUnKsYlckuiGPseXwJvnCjivYPd1MwSw67aRq8Imj4YC:N75mUiduifyefqikg+sm8YC
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1376 965f5894b0caefdbbcceb5da730ab025.tmp 1384 zu.exe -
Loads dropped DLL 2 IoCs
pid Process 1376 965f5894b0caefdbbcceb5da730ab025.tmp 1376 965f5894b0caefdbbcceb5da730ab025.tmp -
Program crash 2 IoCs
pid pid_target Process procid_target 1368 1376 WerFault.exe 92 4988 1376 WerFault.exe 92 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1588 wrote to memory of 1376 1588 965f5894b0caefdbbcceb5da730ab025.exe 92 PID 1588 wrote to memory of 1376 1588 965f5894b0caefdbbcceb5da730ab025.exe 92 PID 1588 wrote to memory of 1376 1588 965f5894b0caefdbbcceb5da730ab025.exe 92 PID 1376 wrote to memory of 1384 1376 965f5894b0caefdbbcceb5da730ab025.tmp 93 PID 1376 wrote to memory of 1384 1376 965f5894b0caefdbbcceb5da730ab025.tmp 93 PID 1376 wrote to memory of 1384 1376 965f5894b0caefdbbcceb5da730ab025.tmp 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\965f5894b0caefdbbcceb5da730ab025.exe"C:\Users\Admin\AppData\Local\Temp\965f5894b0caefdbbcceb5da730ab025.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\is-40Q1V.tmp\965f5894b0caefdbbcceb5da730ab025.tmp"C:\Users\Admin\AppData\Local\Temp\is-40Q1V.tmp\965f5894b0caefdbbcceb5da730ab025.tmp" /SL5="$70172,1022294,57856,C:\Users\Admin\AppData\Local\Temp\965f5894b0caefdbbcceb5da730ab025.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\is-3H82E.tmp\zu.exe"C:\Users\Admin\AppData\Local\Temp\is-3H82E.tmp\zu.exe" -o -P pwzx bb.zip3⤵
- Executes dropped EXE
PID:1384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 9523⤵
- Program crash
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 9603⤵
- Program crash
PID:4988
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1376 -ip 13761⤵PID:936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1376 -ip 13761⤵PID:1536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:4628
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD5c1379673f4da2288dd760469c1f8e82b
SHA1b130f84e58cb596139d0432eef15da0fce5340de
SHA2560b4f243b6d1580260440430a1c6a5d2e74f3e8e13360869afd774f21b8e8ecb6
SHA512956e96b6b161996ad7ea3f20e7a9e95751515aab4e2e301aadd66b95783b66743f552a85f00b6feb2aa8744214c314395b56fb04397b1d9b8332b7db6cf67fbc
-
Filesize
708KB
MD5d11f58daf5eeeee12ee04c1d92750774
SHA19890b9b80e11b9acd259f14795c237602ac13ccb
SHA2562a41ca5721fdf2d185d905b9798d7fd7577e22136e1e1ab7501c6e29fc83c6bf
SHA512ab448ef42ef4cb282b4ecb025a1e673385d2ad781ff8127654ac60a577a33251d0fc7c4e1afe28fcd6e58f27cbb72e77a39d889e275835e71efb7dcd8bbf4607
-
Filesize
875KB
MD5fddef661b25229f14803ac310b998a19
SHA10ba60f48cdddc350f408a4a7dff70fa1d8ae1b2a
SHA2560352a4f9bb4959fe75c7005028073e829779fb14f070ad17d8e7e2172f0a3b3b
SHA512b1a93babfa39d4717055fd2b19218267bea4978b8ac4357550d5314fb6f30585a6d2a6bed98dd2950c42e68ae7820946c451ad03be7d65a9a4196dc5e063d345
-
Filesize
164KB
MD575375c22c72f1beb76bea39c22a1ed68
SHA1e1652b058195db3f5f754b7ab430652ae04a50b8
SHA2568d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a
SHA5121b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a
-
Filesize
697KB
MD5832dab307e54aa08f4b6cdd9b9720361
SHA1ebd007fb7482040ecf34339e4bf917209c1018df
SHA256cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3
SHA512358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49