Analysis
-
max time kernel
51s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
vaultFile12434153038098896463.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
vaultFile12434153038098896463.exe
Resource
win10v2004-20240508-en
General
-
Target
vaultFile12434153038098896463.exe
-
Size
87.1MB
-
MD5
0f14001e7b7c9a24c46296e25074b39a
-
SHA1
b10d1a303d0e9f481fd9bb675122c0dcd24f33d9
-
SHA256
3a3883dcdca19be0d1132e943682aece990494ce58e40d679b2a0b9cde481eff
-
SHA512
7ecd5aa169c3bc17f74b49951e201cf14cf115994b1e763cc02cf71080929696807bde45c583c355a41670a0a977a3078b251a1a783e6a5a3e458f49131119f1
-
SSDEEP
1572864:Dl7/l8tMEFBMv19JNKgUkoMm+q5s0fpbVMsINs03/OpZUuSASFe4bt6l4xnqKsm6:Dl7/zEcv19Jd/Dq5soVM5a0POpquSzFE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4488 vaultFile12434153038098896463.tmp -
Loads dropped DLL 6 IoCs
pid Process 4488 vaultFile12434153038098896463.tmp 4488 vaultFile12434153038098896463.tmp 4488 vaultFile12434153038098896463.tmp 4488 vaultFile12434153038098896463.tmp 4488 vaultFile12434153038098896463.tmp 4488 vaultFile12434153038098896463.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2768 4488 WerFault.exe 85 1304 4488 WerFault.exe 85 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4488 vaultFile12434153038098896463.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4488 vaultFile12434153038098896463.tmp 4488 vaultFile12434153038098896463.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3068 wrote to memory of 4488 3068 vaultFile12434153038098896463.exe 85 PID 3068 wrote to memory of 4488 3068 vaultFile12434153038098896463.exe 85 PID 3068 wrote to memory of 4488 3068 vaultFile12434153038098896463.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\vaultFile12434153038098896463.exe"C:\Users\Admin\AppData\Local\Temp\vaultFile12434153038098896463.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\is-2VL5M.tmp\vaultFile12434153038098896463.tmp"C:\Users\Admin\AppData\Local\Temp\is-2VL5M.tmp\vaultFile12434153038098896463.tmp" /SL5="$801E8,90456719,806400,C:\Users\Admin\AppData\Local\Temp\vaultFile12434153038098896463.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 16803⤵
- Program crash
PID:2768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 22843⤵
- Program crash
PID:1304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4488 -ip 44881⤵PID:740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4488 -ip 44881⤵PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5032a47886b37474c68e22c9c9fd2d1c3
SHA10d9311f561d96860f06a9d00d451ccf25006b4ec
SHA256e35a3c699c57413fd079e35bca26665eae12344a2c0e1157a9626d244fcda127
SHA512e86abbefda47701b09542f28d4e784a14b1e4fb70deaf368326892cdebecf41e5b778a9c4e8647a6d82ef64a1a75cb8636494194a1e0c4dad26d908bd1a74d67
-
Filesize
189KB
MD544d765266942c3504553a6531bf8463a
SHA140cbae17fde4c9dfe76495cde3b87abdeb4ce248
SHA2560a961b983903269f0f1be0a26c66435c92c827e0b9d59f531db4de4dd0a06955
SHA5127f64b95981a6dcaa5947e71a8f25a69ec0086d59ea446e921fa018b4529de15bc2d4f31183a978a55ae0cdf4fe79133cec541dffc15e02ed04a59501a15f9645
-
Filesize
33KB
MD52b3aeef8e06946089cc268ad84b1d66e
SHA187c28686b7c81681a9f21946243fec4c9715022f
SHA256259702b8a727488eab22d885edfdbffba715b8a608db1609f0136ca3d9fbd899
SHA512b35120423e1dea0397ce316013f7838bf6c31e229ec933cc026e411b25b42704a01c7779145c0f7a25c4aa523af22fb40d56844cc767f828349ba72a40f4aeeb
-
Filesize
4KB
MD5b2dffed6951e5b72c050483a62f66f66
SHA152a5e7eeea957f96a5bb7a654f5dd5661784091f
SHA25620047b963b358e6853012294d67ed6ef8e81d423635c8be51f462ad7e579a3a9
SHA512f5993933bb36360578bc9cc544fce767c9e68b4d5d1384a3f57cdfd9dcb7b713e3dfc815f9498d36e1b93c6e2a7f9c063c4d5ef41f4ef6f3c0f6fe818851974f
-
Filesize
13KB
MD53246b9289398e5d3668129fd1f6aa5be
SHA1b4ed4c02a2a83d7ab8dafa62f77bfc990d8924b0
SHA25621338f7a6c7200113e6d2cb19577d223bd9886096ad27e91b7749036247dd117
SHA51275b2f6fffbfa116df001c0f594ba82a814adbaf5707a875ad12af9e35da2c9f3397788fc267bc67cb9930dc13f247a5bec52ebfc1c48aafd8d50f177bfbf56d6
-
Filesize
66KB
MD5052e3cbd4009f65055d36541ce9cc91d
SHA19dc0a7035afd04236b673389833b6c56affd64e2
SHA2567eb9dab1c04d4abce6749ad9d94ddd0690e3c99c6890f979f07efe4775ee1eab
SHA5125260ef11ba932c309c615caad7bb063f0a6d1d15376145ab1078c60a9dca375b2baf50bc741d31bd01c9b26c857f57eeb3266ae6ecf5e5a6c308e6c2c4739811