Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 16:02
Static task
static1
Behavioral task
behavioral1
Sample
beetle-cab.cab
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
beetle-cab/7za.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
beetle-cab/7za.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
beetle-cab/7zxa.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
beetle-cab/arc.7z
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
beetle-cab/start.cmd
Resource
win10v2004-20240508-en
General
-
Target
beetle-cab/7zxa.dll
-
Size
161KB
-
MD5
72dcc77ba25ebc4984d959a78c8646d5
-
SHA1
50347fcdb44426918d2eeafd5ff8ca9385fbbb0b
-
SHA256
6b4888207c46c23d2d4e4eace8a2db01711692bc7d4bb93f3750bc41e91bb73c
-
SHA512
1ff7c0027802e65d5d668f2c7d90b71d720c964e7da03c2a8dc8e0b8456bfa8658ca57de17e66a1ebaaef5bf0be1806188813e1da608b6861bc4d8b6a48f8876
-
SSDEEP
3072:ifGI+bVn1rLT8VxY9ZcHwDLULRpqnhlGZcQU6aRg+NmVRmCHOtGgYckP:3eK7QwUqnT6aRfmVR5SYz
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2832 1440 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 740 wrote to memory of 1440 740 rundll32.exe rundll32.exe PID 740 wrote to memory of 1440 740 rundll32.exe rundll32.exe PID 740 wrote to memory of 1440 740 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\beetle-cab\7zxa.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\beetle-cab\7zxa.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 6043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1440 -ip 14401⤵