Analysis
-
max time kernel
24s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 16:31
Static task
static1
Behavioral task
behavioral1
Sample
0014191a7a693e9b3cf674eb16ebb650N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0014191a7a693e9b3cf674eb16ebb650N.exe
Resource
win10v2004-20240709-en
General
-
Target
0014191a7a693e9b3cf674eb16ebb650N.exe
-
Size
634KB
-
MD5
0014191a7a693e9b3cf674eb16ebb650
-
SHA1
0d0414a68e5c8a1f4d8d32cf6892e66d112b0217
-
SHA256
1ea6a49460127637c82333d02adb9e53bfe041bac802b5983a9dc055c43b5c7d
-
SHA512
b587bae04449e45818c848705d866c082073aa8edbb00df5e0361bdcb1fb03e6215e8393569042ebae033b1b46ee6aec6e7c43ea141248d92df912a428509d24
-
SSDEEP
6144:IooZIFH5nfYz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtlB:ISF1O1gL5pRTcAkS/3hzN8qE43fm78VX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4044 MSWDM.EXE 1456 MSWDM.EXE 1128 0014191A7A693E9B3CF674EB16EBB650N.EXE 1808 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 0014191a7a693e9b3cf674eb16ebb650N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 0014191a7a693e9b3cf674eb16ebb650N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 0014191a7a693e9b3cf674eb16ebb650N.exe File opened for modification C:\Windows\dev9673.tmp 0014191a7a693e9b3cf674eb16ebb650N.exe File opened for modification C:\Windows\dev9673.tmp MSWDM.EXE -
Program crash 1 IoCs
pid pid_target Process procid_target 2384 1808 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1456 MSWDM.EXE 1456 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4504 wrote to memory of 4044 4504 0014191a7a693e9b3cf674eb16ebb650N.exe 84 PID 4504 wrote to memory of 4044 4504 0014191a7a693e9b3cf674eb16ebb650N.exe 84 PID 4504 wrote to memory of 4044 4504 0014191a7a693e9b3cf674eb16ebb650N.exe 84 PID 4504 wrote to memory of 1456 4504 0014191a7a693e9b3cf674eb16ebb650N.exe 85 PID 4504 wrote to memory of 1456 4504 0014191a7a693e9b3cf674eb16ebb650N.exe 85 PID 4504 wrote to memory of 1456 4504 0014191a7a693e9b3cf674eb16ebb650N.exe 85 PID 1456 wrote to memory of 1128 1456 MSWDM.EXE 86 PID 1456 wrote to memory of 1128 1456 MSWDM.EXE 86 PID 1456 wrote to memory of 1808 1456 MSWDM.EXE 88 PID 1456 wrote to memory of 1808 1456 MSWDM.EXE 88 PID 1456 wrote to memory of 1808 1456 MSWDM.EXE 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0014191a7a693e9b3cf674eb16ebb650N.exe"C:\Users\Admin\AppData\Local\Temp\0014191a7a693e9b3cf674eb16ebb650N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4044
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev9673.tmp!C:\Users\Admin\AppData\Local\Temp\0014191a7a693e9b3cf674eb16ebb650N.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\0014191A7A693E9B3CF674EB16EBB650N.EXE
- Executes dropped EXE
PID:1128
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev9673.tmp!C:\Users\Admin\AppData\Local\Temp\0014191A7A693E9B3CF674EB16EBB650N.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 3404⤵
- Program crash
PID:2384
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1808 -ip 18081⤵PID:3140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
634KB
MD5c44d5790e57a8ade3e1e11896ade1f22
SHA1917645ed30ca8dd9e0acb2f461d08878c4dae4ea
SHA256a8c4374750bf84ce7f26f843c0fe849ba0e913f671bf681ba1fcb2d6e44ea905
SHA51227f524d905194f95b0a2763b16c700b63b90ed5f41cbc716a33d5573b701e9d0d5c4247f90c9391eabf21893844eada102bdd66720e3ea7fbe41cf9f599c3ebc
-
Filesize
176KB
MD5e47fbba037ae23d415b4b9f8221522df
SHA1b966d6d5fbf15a234a85bc77ab9afcef9af6021f
SHA25605a488d691805b11aa41780d6f7e39545d7543edfc5b8bcd238c645bd4b49c3d
SHA5122d6038d2addf36fc0ee63acca180e1fa0501c48c88edf460f899454b32315433d94b805f3c2a678e87df6fa71bdd1f6b43e4e26d298cf60f64282223febe4e7e
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628