Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 21:30
Behavioral task
behavioral1
Sample
33f44527100ab0e940ac9d10664cc70eda7285c4491c1b26acc4f96cccc4d96d.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
33f44527100ab0e940ac9d10664cc70eda7285c4491c1b26acc4f96cccc4d96d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
General
-
Target
33f44527100ab0e940ac9d10664cc70eda7285c4491c1b26acc4f96cccc4d96d.exe
-
Size
1.5MB
-
MD5
862070f88be9b53009fadec1f3c4455b
-
SHA1
51693d87e8ac936ded1131279372956c59644ba3
-
SHA256
33f44527100ab0e940ac9d10664cc70eda7285c4491c1b26acc4f96cccc4d96d
-
SHA512
26d2411866046541ceff11bd8fa0ba8c1e7ac461bee65496608ae904c758708de76410570e46bb45930953372056b739e47ed442db9e325fd15754b7976fd034
-
SSDEEP
24576:lI8tXzEMohhJjvT+QPSBx5fCi6yX6N/9XSiOMEYAV20FZMTDH8W:lI89oMuaQPSBxpF6yX6N/dS1MEYAjZmt
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2444-0-0x0000000000400000-0x0000000000507000-memory.dmp UPX behavioral2/memory/2444-6-0x0000000000400000-0x0000000000507000-memory.dmp UPX behavioral2/memory/2444-11-0x0000000000400000-0x0000000000507000-memory.dmp UPX -
Loads dropped DLL 2 IoCs
Processes:
33f44527100ab0e940ac9d10664cc70eda7285c4491c1b26acc4f96cccc4d96d.exepid Process 2444 33f44527100ab0e940ac9d10664cc70eda7285c4491c1b26acc4f96cccc4d96d.exe 2444 33f44527100ab0e940ac9d10664cc70eda7285c4491c1b26acc4f96cccc4d96d.exe -
Processes:
resource yara_rule behavioral2/memory/2444-0-0x0000000000400000-0x0000000000507000-memory.dmp upx behavioral2/memory/2444-6-0x0000000000400000-0x0000000000507000-memory.dmp upx behavioral2/memory/2444-11-0x0000000000400000-0x0000000000507000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2896 2444 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
33f44527100ab0e940ac9d10664cc70eda7285c4491c1b26acc4f96cccc4d96d.exedescription pid Process procid_target PID 2444 wrote to memory of 4628 2444 33f44527100ab0e940ac9d10664cc70eda7285c4491c1b26acc4f96cccc4d96d.exe 85 PID 2444 wrote to memory of 4628 2444 33f44527100ab0e940ac9d10664cc70eda7285c4491c1b26acc4f96cccc4d96d.exe 85 PID 2444 wrote to memory of 4628 2444 33f44527100ab0e940ac9d10664cc70eda7285c4491c1b26acc4f96cccc4d96d.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\33f44527100ab0e940ac9d10664cc70eda7285c4491c1b26acc4f96cccc4d96d.exe"C:\Users\Admin\AppData\Local\Temp\33f44527100ab0e940ac9d10664cc70eda7285c4491c1b26acc4f96cccc4d96d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\33f44527100ab0e940ac9d10664cc70eda7285c4491c1b26acc4f96cccc4d96d.exe"C:\Users\Admin\AppData\Local\Temp\33f44527100ab0e940ac9d10664cc70eda7285c4491c1b26acc4f96cccc4d96d.exe"2⤵PID:4628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 9482⤵
- Program crash
PID:2896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2444 -ip 24441⤵PID:1916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c