Analysis
-
max time kernel
21s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:47
Static task
static1
Behavioral task
behavioral1
Sample
e35c9636dd32f780eb9f3e48f70bd23e920833b3088b57b766c6b6fb50a46c09N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e35c9636dd32f780eb9f3e48f70bd23e920833b3088b57b766c6b6fb50a46c09N.exe
Resource
win10v2004-20240802-en
General
-
Target
e35c9636dd32f780eb9f3e48f70bd23e920833b3088b57b766c6b6fb50a46c09N.exe
-
Size
9.6MB
-
MD5
d877acf92bee1a02633e2b68ce0b8de0
-
SHA1
fbefc3a5c61e08768210f156fd20142b39d49fbb
-
SHA256
e35c9636dd32f780eb9f3e48f70bd23e920833b3088b57b766c6b6fb50a46c09
-
SHA512
c6991ff0d1b6892c9ce39e8b549789ee2949af954af04539c10166c7dfa4a5dca3a08eaa94c1dd3c0244dcfc90c296e82f79e8b184c8caad665b13a947662905
-
SSDEEP
196608:SD+wzFJHUOzrCqOYYD+wzFJHUOzrCqOY5jBHY:g+wzFJHUK2qOL+wzFJHUK2qOyB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion e35c9636dd32f780eb9f3e48f70bd23e920833b3088b57b766c6b6fb50a46c09N.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS e35c9636dd32f780eb9f3e48f70bd23e920833b3088b57b766c6b6fb50a46c09N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer e35c9636dd32f780eb9f3e48f70bd23e920833b3088b57b766c6b6fb50a46c09N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2436 3020 e35c9636dd32f780eb9f3e48f70bd23e920833b3088b57b766c6b6fb50a46c09N.exe 30 PID 3020 wrote to memory of 2436 3020 e35c9636dd32f780eb9f3e48f70bd23e920833b3088b57b766c6b6fb50a46c09N.exe 30 PID 3020 wrote to memory of 2436 3020 e35c9636dd32f780eb9f3e48f70bd23e920833b3088b57b766c6b6fb50a46c09N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e35c9636dd32f780eb9f3e48f70bd23e920833b3088b57b766c6b6fb50a46c09N.exe"C:\Users\Admin\AppData\Local\Temp\e35c9636dd32f780eb9f3e48f70bd23e920833b3088b57b766c6b6fb50a46c09N.exe"1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3020 -s 6442⤵PID:2436
-