Analysis
-
max time kernel
128s -
max time network
124s -
platform
windows10_x64 -
resource
win10 -
submitted
31-07-2020 12:05
Static task
static1
Behavioral task
behavioral1
Sample
e72863de70ee56a86c394313e9ac4558.exe
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e72863de70ee56a86c394313e9ac4558.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
e72863de70ee56a86c394313e9ac4558.exe
-
Size
150KB
-
MD5
e72863de70ee56a86c394313e9ac4558
-
SHA1
c9c57dd5bcfd469b4872a2851b93e7c6716b33bd
-
SHA256
c5bc1c6af0d7ef6f65692aec19d9ef0f393a1ca80ce9a45671ce451e41dee85a
-
SHA512
c70e1270c6380a378cee5f4aa6bf83c0cd9a9d439b9da7259fe3e338fd0486ecc95bd3071b3bb9dd920c4c19cf0ad7315850d5156cd0132870991d3bd16616fd
Score
8/10
Malware Config
Signatures
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3108 3908 WerFault.exe e72863de70ee56a86c394313e9ac4558.exe 1012 2988 WerFault.exe luupsor.exe 3932 2988 WerFault.exe luupsor.exe 3776 3908 WerFault.exe e72863de70ee56a86c394313e9ac4558.exe 3824 3908 WerFault.exe e72863de70ee56a86c394313e9ac4558.exe 496 2988 WerFault.exe luupsor.exe 3376 2988 WerFault.exe luupsor.exe 3736 2680 WerFault.exe tccqfs.exe 3804 2988 WerFault.exe luupsor.exe 4088 3928 WerFault.exe francqi.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 3108 WerFault.exe Token: SeBackupPrivilege 3108 WerFault.exe Token: SeDebugPrivilege 3108 WerFault.exe Token: SeDebugPrivilege 1012 WerFault.exe Token: SeDebugPrivilege 3932 WerFault.exe Token: SeDebugPrivilege 3776 WerFault.exe Token: SeDebugPrivilege 3824 WerFault.exe Token: SeDebugPrivilege 496 WerFault.exe Token: SeDebugPrivilege 3376 WerFault.exe Token: SeDebugPrivilege 3804 WerFault.exe Token: SeDebugPrivilege 3736 WerFault.exe Token: SeDebugPrivilege 4088 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 136 IoCs
Processes:
WerFault.exee72863de70ee56a86c394313e9ac4558.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 3108 WerFault.exe 3108 WerFault.exe 3108 WerFault.exe 3108 WerFault.exe 3108 WerFault.exe 3108 WerFault.exe 3108 WerFault.exe 3108 WerFault.exe 3108 WerFault.exe 3108 WerFault.exe 3108 WerFault.exe 3108 WerFault.exe 3108 WerFault.exe 3908 e72863de70ee56a86c394313e9ac4558.exe 3908 e72863de70ee56a86c394313e9ac4558.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 1012 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3932 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3776 WerFault.exe 3824 WerFault.exe 3824 WerFault.exe 3824 WerFault.exe 3824 WerFault.exe 3824 WerFault.exe 3824 WerFault.exe 3824 WerFault.exe 3824 WerFault.exe 3824 WerFault.exe 3824 WerFault.exe -
Executes dropped EXE 3 IoCs
Processes:
luupsor.exetccqfs.exefrancqi.exepid process 2988 luupsor.exe 2680 tccqfs.exe 3928 francqi.exe -
Drops file in Windows directory 5 IoCs
Processes:
e72863de70ee56a86c394313e9ac4558.exeluupsor.exetccqfs.exedescription ioc process File created C:\Windows\Tasks\luupsor.job e72863de70ee56a86c394313e9ac4558.exe File opened for modification C:\Windows\Tasks\luupsor.job e72863de70ee56a86c394313e9ac4558.exe File created C:\Windows\Tasks\brxxrilcfuxarilcfux.job luupsor.exe File created C:\Windows\Tasks\francqi.job tccqfs.exe File opened for modification C:\Windows\Tasks\francqi.job tccqfs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e72863de70ee56a86c394313e9ac4558.exe"C:\Users\Admin\AppData\Local\Temp\e72863de70ee56a86c394313e9ac4558.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Drops file in Windows directory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 5402⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 8562⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 8682⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\kxbcds\luupsor.exeC:\ProgramData\kxbcds\luupsor.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 5362⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 7162⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 7042⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 7722⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 6722⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\TEMP\tccqfs.exeC:\Windows\TEMP\tccqfs.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 5402⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\aitehju\francqi.exeC:\ProgramData\aitehju\francqi.exe start1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 5442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAD0F.tmp.WERInternalMetadata.xml
-
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAD0F.tmp.WERInternalMetadata.xml
-
C:\ProgramData\aitehju\francqi.exe
-
C:\ProgramData\aitehju\francqi.exe
-
C:\ProgramData\kxbcds\luupsor.exe
-
C:\ProgramData\kxbcds\luupsor.exe
-
C:\Windows\TEMP\tccqfs.exe
-
C:\Windows\Tasks\luupsor.job
-
C:\Windows\Temp\tccqfs.exe
-
memory/496-32-0x0000000003FF0000-0x0000000003FF1000-memory.dmpFilesize
4KB
-
memory/496-29-0x00000000037B0000-0x00000000037B1000-memory.dmpFilesize
4KB
-
memory/496-28-0x00000000037B0000-0x00000000037B1000-memory.dmpFilesize
4KB
-
memory/1012-15-0x0000000003800000-0x0000000003801000-memory.dmpFilesize
4KB
-
memory/1012-14-0x0000000003410000-0x0000000003411000-memory.dmpFilesize
4KB
-
memory/1012-11-0x0000000003010000-0x0000000003011000-memory.dmpFilesize
4KB
-
memory/2680-41-0x0000000003C80000-0x0000000003C81000-memory.dmpFilesize
4KB
-
memory/2680-40-0x0000000003C80000-0x0000000003C81000-memory.dmpFilesize
4KB
-
memory/2988-9-0x000000000351C000-0x000000000351D000-memory.dmpFilesize
4KB
-
memory/2988-10-0x0000000003E90000-0x0000000003E91000-memory.dmpFilesize
4KB
-
memory/3108-5-0x0000000004840000-0x0000000004841000-memory.dmpFilesize
4KB
-
memory/3108-3-0x0000000004200000-0x0000000004201000-memory.dmpFilesize
4KB
-
memory/3108-2-0x0000000004200000-0x0000000004201000-memory.dmpFilesize
4KB
-
memory/3376-33-0x0000000002E00000-0x0000000002E01000-memory.dmpFilesize
4KB
-
memory/3376-36-0x0000000003530000-0x0000000003531000-memory.dmpFilesize
4KB
-
memory/3736-46-0x0000000002E00000-0x0000000002E01000-memory.dmpFilesize
4KB
-
memory/3736-49-0x0000000003430000-0x0000000003431000-memory.dmpFilesize
4KB
-
memory/3736-43-0x0000000002E00000-0x0000000002E01000-memory.dmpFilesize
4KB
-
memory/3776-20-0x0000000004E00000-0x0000000004E01000-memory.dmpFilesize
4KB
-
memory/3804-50-0x00000000038D0000-0x00000000038D1000-memory.dmpFilesize
4KB
-
memory/3804-44-0x0000000002E00000-0x0000000002E01000-memory.dmpFilesize
4KB
-
memory/3824-24-0x0000000004520000-0x0000000004521000-memory.dmpFilesize
4KB
-
memory/3824-27-0x0000000004A50000-0x0000000004A51000-memory.dmpFilesize
4KB
-
memory/3908-0-0x0000000003521000-0x0000000003522000-memory.dmpFilesize
4KB
-
memory/3908-1-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/3928-55-0x000000000351C000-0x000000000351D000-memory.dmpFilesize
4KB
-
memory/3928-56-0x0000000003E40000-0x0000000003E41000-memory.dmpFilesize
4KB
-
memory/3932-19-0x0000000003FE0000-0x0000000003FE1000-memory.dmpFilesize
4KB
-
memory/3932-16-0x00000000038B0000-0x00000000038B1000-memory.dmpFilesize
4KB
-
memory/4088-57-0x00000000034F0000-0x00000000034F1000-memory.dmpFilesize
4KB
-
memory/4088-60-0x0000000003BA0000-0x0000000003BA1000-memory.dmpFilesize
4KB