Analysis
-
max time kernel
24s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 03:42
Behavioral task
behavioral1
Sample
7zFMmgr.exe
Resource
win7-20240221-en
General
-
Target
7zFMmgr.exe
-
Size
286KB
-
MD5
ae7fe5d1c0c635496c2729eba26355e0
-
SHA1
4b4c8a79fbd911904ebfa0b26915f588b3a8b49a
-
SHA256
b393d21a034f5cac91bcb63d6132d72f6edea162b7c919297c9d39e5b1ce42d8
-
SHA512
06dece29658f5fb90bbf953aab89696b986efd9d4f93ae32672bd59235e3328b68bd3e2974eda07900295cc751c7f61e08b7d9ed50949b7be14d293797772a4d
-
SSDEEP
6144:uAcCIWiyr7JHn17lTBl3+ocmQ1t274+dTc:uAQK7517lT33c1t274+dTc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4112 7zFMmgrmgr.exe -
Loads dropped DLL 2 IoCs
pid Process 4112 7zFMmgrmgr.exe 4864 7zFMmgr.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3580 4864 WerFault.exe 80 3176 4112 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4864 wrote to memory of 4112 4864 7zFMmgr.exe 81 PID 4864 wrote to memory of 4112 4864 7zFMmgr.exe 81 PID 4864 wrote to memory of 4112 4864 7zFMmgr.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zFMmgr.exe"C:\Users\Admin\AppData\Local\Temp\7zFMmgr.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\7zFMmgrmgr.exeC:\Users\Admin\AppData\Local\Temp\7zFMmgrmgr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 3243⤵
- Program crash
PID:3176
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 2242⤵
- Program crash
PID:3580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4112 -ip 41121⤵PID:2912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4864 -ip 48641⤵PID:4776
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD5303f491b9fc879064b210cb0b865d178
SHA15cbdc35fb45bd3fb5ac62950ec22443a4179203c
SHA25615f7fb2edc9b34e0da2fc658df38d8aea52664f6be1510dba4636dc13f466f86
SHA51296c076c5027998281c408c1314e67f14c0150ec01173a400bf42e482866744d7e6f58cc7bf9748124c3a652753020f4606b170b61f1e722f8d4f74bff65fee24
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219