Malware Analysis Report

2024-10-23 21:05

Sample ID 240613-vwy6ra1drn
Target 4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
SHA256 4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea
Tags
score
5/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
5/10

SHA256

4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea

Threat Level: Likely benign

The file 4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe was found to be: Likely benign.

Malicious Activity Summary


Suspicious use of SetThreadContext

Program crash

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 17:21

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 17:21

Reported

2024-06-13 17:23

Platform

win7-20240508-en

Max time kernel

117s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1776 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
PID 1776 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
PID 1776 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
PID 1776 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
PID 1776 wrote to memory of 3036 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
PID 1776 wrote to memory of 3036 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
PID 1776 wrote to memory of 3036 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
PID 1776 wrote to memory of 3036 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
PID 1776 wrote to memory of 3036 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
PID 1776 wrote to memory of 3036 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
PID 1776 wrote to memory of 3036 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
PID 3036 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Windows\SysWOW64\WerFault.exe
PID 3036 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Windows\SysWOW64\WerFault.exe
PID 3036 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Windows\SysWOW64\WerFault.exe
PID 3036 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Windows\SysWOW64\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe

"C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe"

C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe

"C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe"

C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe

"C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 36

Network

N/A

Files

memory/1776-0-0x0000000074DFE000-0x0000000074DFF000-memory.dmp

memory/1776-1-0x0000000000E00000-0x0000000000EEC000-memory.dmp

memory/1776-2-0x0000000074DF0000-0x00000000754DE000-memory.dmp

memory/1776-3-0x00000000006D0000-0x00000000006EA000-memory.dmp

memory/1776-4-0x0000000000680000-0x0000000000690000-memory.dmp

memory/1776-5-0x0000000005DC0000-0x0000000005E4A000-memory.dmp

memory/3036-6-0x0000000000400000-0x0000000000443000-memory.dmp

memory/3036-7-0x0000000000400000-0x0000000000443000-memory.dmp

memory/3036-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/3036-10-0x0000000000400000-0x0000000000443000-memory.dmp

memory/1776-11-0x0000000074DF0000-0x00000000754DE000-memory.dmp

memory/3036-12-0x0000000000A80000-0x0000000000D83000-memory.dmp

memory/3036-13-0x0000000000400000-0x0000000000443000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 17:21

Reported

2024-06-13 17:23

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

52s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe"

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4180 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
PID 4180 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
PID 4180 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
PID 4180 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
PID 4180 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe
PID 4180 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe

Processes

C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe

"C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe"

C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe

"C:\Users\Admin\AppData\Local\Temp\4c7e553411c390511f61ab68183eaf5b5857a32eca4c46eeaca75069ad8022ea.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2720 -ip 2720

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 184

Network

Files

memory/4180-0-0x00000000749DE000-0x00000000749DF000-memory.dmp

memory/4180-1-0x00000000006B0000-0x000000000079C000-memory.dmp

memory/4180-2-0x00000000056C0000-0x0000000005C64000-memory.dmp

memory/4180-3-0x00000000051E0000-0x0000000005272000-memory.dmp

memory/4180-4-0x00000000051C0000-0x00000000051CA000-memory.dmp

memory/4180-5-0x00000000749D0000-0x0000000075180000-memory.dmp

memory/4180-6-0x00000000080F0000-0x000000000810A000-memory.dmp

memory/4180-7-0x0000000006370000-0x0000000006380000-memory.dmp

memory/4180-8-0x0000000008110000-0x000000000819A000-memory.dmp

memory/4180-9-0x000000000A8A0000-0x000000000A93C000-memory.dmp

memory/2720-10-0x0000000000400000-0x0000000000443000-memory.dmp

memory/4180-12-0x00000000749D0000-0x0000000075180000-memory.dmp

memory/2720-13-0x0000000000EE0000-0x000000000122A000-memory.dmp

memory/2720-14-0x0000000000400000-0x0000000000443000-memory.dmp