Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
7eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e.exe
Resource
win10v2004-20240709-en
General
-
Target
7eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e.exe
-
Size
755KB
-
MD5
55ce0d79b0c5752f3645089c66a326e0
-
SHA1
39a53ad402dd71430016fed37e5763b21e86c43e
-
SHA256
7eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e
-
SHA512
cccf933bc48659e18b7842e42c3a77157f2cdeb745e901b440900489da7bf3338e9c68ac8a32a39bddaaffaa5d5972a139bc811c62afb402ce583a0b962b0c37
-
SSDEEP
12288:TNhBJitWYoOOIpkYQJsYwA8/BLDjoFrxzebIz+WxxBVDGYP3I8:XBgcY8DlBODUzzEIdxxjDdP48
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3036 setup.exe -
Loads dropped DLL 10 IoCs
pid Process 2976 7eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2696 3036 WerFault.exe 30 -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2976 7eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e.exe 2976 7eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e.exe 3036 setup.exe 3036 setup.exe 3036 setup.exe 3036 setup.exe 3036 setup.exe 3036 setup.exe 3036 setup.exe 3036 setup.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3036 2976 7eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e.exe 30 PID 2976 wrote to memory of 3036 2976 7eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e.exe 30 PID 2976 wrote to memory of 3036 2976 7eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e.exe 30 PID 2976 wrote to memory of 3036 2976 7eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e.exe 30 PID 2976 wrote to memory of 3036 2976 7eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e.exe 30 PID 2976 wrote to memory of 3036 2976 7eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e.exe 30 PID 2976 wrote to memory of 3036 2976 7eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e.exe 30 PID 3036 wrote to memory of 2696 3036 setup.exe 32 PID 3036 wrote to memory of 2696 3036 setup.exe 32 PID 3036 wrote to memory of 2696 3036 setup.exe 32 PID 3036 wrote to memory of 2696 3036 setup.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e.exe"C:\Users\Admin\AppData\Local\Temp\7eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 4683⤵
- Loads dropped DLL
- Program crash
PID:2696
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
755KB
MD555ce0d79b0c5752f3645089c66a326e0
SHA139a53ad402dd71430016fed37e5763b21e86c43e
SHA2567eca5c8ab1312c0683157d240c16910d333504e8678565bdac8821e1d35f156e
SHA512cccf933bc48659e18b7842e42c3a77157f2cdeb745e901b440900489da7bf3338e9c68ac8a32a39bddaaffaa5d5972a139bc811c62afb402ce583a0b962b0c37