Analysis
-
max time kernel
131s -
max time network
127s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
06-11-2020 11:47
Static task
static1
Behavioral task
behavioral1
Sample
f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889.exe
Resource
win7v20201028
General
-
Target
f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889.exe
-
Size
978KB
-
MD5
6e8498b91bf1a607f76bc04b2ad2fa70
-
SHA1
95e1904c2f67cd364b8b386e5ccdd33edcd4955c
-
SHA256
f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889
-
SHA512
00553a4611ec8badd707471ca53cebdc6cb876043a2e52522fb058369c228cfcf9fadb105795177bec50cc181c54879ab3cab74009ed2828ea96268c3dbcd172
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Decoder.exeDecoder.exepid process 608 Decoder.exe 1256 Decoder.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 464 cmd.exe -
Loads dropped DLL 10 IoCs
Processes:
WerFault.exeWerFault.exepid process 1084 WerFault.exe 1084 WerFault.exe 1084 WerFault.exe 1084 WerFault.exe 672 WerFault.exe 672 WerFault.exe 672 WerFault.exe 672 WerFault.exe 1084 WerFault.exe 672 WerFault.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1084 608 WerFault.exe Decoder.exe 672 1256 WerFault.exe Decoder.exe -
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 1496 timeout.exe 836 timeout.exe 1424 timeout.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
Processes:
Decoder.exeDecoder.exepid process 608 Decoder.exe 1256 Decoder.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
WerFault.exeWerFault.exepid process 1084 WerFault.exe 672 WerFault.exe 672 WerFault.exe 1084 WerFault.exe 672 WerFault.exe 1084 WerFault.exe 672 WerFault.exe 1084 WerFault.exe 672 WerFault.exe 1084 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 1084 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889.exeWerFault.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1824 f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889.exe Token: SeDebugPrivilege 1084 WerFault.exe Token: SeDebugPrivilege 672 WerFault.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889.execmd.execmd.execmd.exeDecoder.exeDecoder.exedescription pid process target process PID 1824 wrote to memory of 1640 1824 f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889.exe cmd.exe PID 1824 wrote to memory of 1640 1824 f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889.exe cmd.exe PID 1824 wrote to memory of 1640 1824 f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889.exe cmd.exe PID 1824 wrote to memory of 1080 1824 f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889.exe cmd.exe PID 1824 wrote to memory of 1080 1824 f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889.exe cmd.exe PID 1824 wrote to memory of 1080 1824 f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889.exe cmd.exe PID 1824 wrote to memory of 464 1824 f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889.exe cmd.exe PID 1824 wrote to memory of 464 1824 f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889.exe cmd.exe PID 1824 wrote to memory of 464 1824 f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889.exe cmd.exe PID 1080 wrote to memory of 1496 1080 cmd.exe timeout.exe PID 1080 wrote to memory of 1496 1080 cmd.exe timeout.exe PID 1080 wrote to memory of 1496 1080 cmd.exe timeout.exe PID 1640 wrote to memory of 1424 1640 cmd.exe timeout.exe PID 1640 wrote to memory of 1424 1640 cmd.exe timeout.exe PID 1640 wrote to memory of 1424 1640 cmd.exe timeout.exe PID 464 wrote to memory of 836 464 cmd.exe timeout.exe PID 464 wrote to memory of 836 464 cmd.exe timeout.exe PID 464 wrote to memory of 836 464 cmd.exe timeout.exe PID 1640 wrote to memory of 608 1640 cmd.exe Decoder.exe PID 1640 wrote to memory of 608 1640 cmd.exe Decoder.exe PID 1640 wrote to memory of 608 1640 cmd.exe Decoder.exe PID 1640 wrote to memory of 608 1640 cmd.exe Decoder.exe PID 1080 wrote to memory of 1256 1080 cmd.exe Decoder.exe PID 1080 wrote to memory of 1256 1080 cmd.exe Decoder.exe PID 1080 wrote to memory of 1256 1080 cmd.exe Decoder.exe PID 1080 wrote to memory of 1256 1080 cmd.exe Decoder.exe PID 608 wrote to memory of 1084 608 Decoder.exe WerFault.exe PID 608 wrote to memory of 1084 608 Decoder.exe WerFault.exe PID 608 wrote to memory of 1084 608 Decoder.exe WerFault.exe PID 608 wrote to memory of 1084 608 Decoder.exe WerFault.exe PID 1256 wrote to memory of 672 1256 Decoder.exe WerFault.exe PID 1256 wrote to memory of 672 1256 Decoder.exe WerFault.exe PID 1256 wrote to memory of 672 1256 Decoder.exe WerFault.exe PID 1256 wrote to memory of 672 1256 Decoder.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889.exe"C:\Users\Admin\AppData\Local\Temp\f0ca23d101868cd75aed85f10eda2c0067e7de7f81f84eee0232e9cd5f319889.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\.cmd""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\Decoder.exe"C:\Users\Admin\AppData\Local\Temp\\\Decoder.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 608 -s 5404⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\.cmd""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\Decoder.exe"C:\Users\Admin\AppData\Local\Temp\\\Decoder.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 5444⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp1EA4.tmp.cmd""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\.cmdMD5
9f3bfaf16ddc6ef0e164ff718feaa75c
SHA1b5ea860963f06f503dcaf8e7ee03b29237ace64f
SHA25602d917932135b74c6e275f4e4d6626d14ce4f05957f8d0c2d81fe50c13836d40
SHA5123c32d2fdb75c526ce7853936cc89efa61eb77ad95112cb19ab519da29b0211717f36bcb3d8928e5dca7e296c9b542537cce316c4e011ed357681a081fefac9a7
-
C:\Users\Admin\AppData\Local\Temp\Decoder.exeMD5
e37021a3f1418f0e8e16fbcaeb983208
SHA17d800522aae223974b99775f8b56be8029474276
SHA2569d19d1befd5def35739d3e1fd3432fde6a11577c393a8ffe3651bb170fba9eab
SHA51249f643e9068ac68effdd597ebe89680d4e6a7d19b2b2c89bb71c3accd333ac8f20216be0f5f4bd13d0f709755332d7dab0a4f99591e1a3176de0fdfccb2f7adf
-
C:\Users\Admin\AppData\Local\Temp\Decoder.exeMD5
e37021a3f1418f0e8e16fbcaeb983208
SHA17d800522aae223974b99775f8b56be8029474276
SHA2569d19d1befd5def35739d3e1fd3432fde6a11577c393a8ffe3651bb170fba9eab
SHA51249f643e9068ac68effdd597ebe89680d4e6a7d19b2b2c89bb71c3accd333ac8f20216be0f5f4bd13d0f709755332d7dab0a4f99591e1a3176de0fdfccb2f7adf
-
C:\Users\Admin\AppData\Local\Temp\Decoder.exeMD5
e37021a3f1418f0e8e16fbcaeb983208
SHA17d800522aae223974b99775f8b56be8029474276
SHA2569d19d1befd5def35739d3e1fd3432fde6a11577c393a8ffe3651bb170fba9eab
SHA51249f643e9068ac68effdd597ebe89680d4e6a7d19b2b2c89bb71c3accd333ac8f20216be0f5f4bd13d0f709755332d7dab0a4f99591e1a3176de0fdfccb2f7adf
-
C:\Users\Admin\AppData\Local\Temp\tmp1EA4.tmp.cmdMD5
f55991d1cf56a2c72ef12fdbaa6390a0
SHA17b6bded6b3ba2751001093165c8c137f20f14faa
SHA2560f448b1f3e64290fe67abffbbfe2d482a689ed666c6167a9ca28a6e060d7533b
SHA51247e1b9e001466ab1d69743cd56dbc7f7df5ce8d61200abfe1ef1c928df6d64a03cf0a11e2a132677355c4239329649cbe847be06ea447ecfa0f675b9d9a75a40
-
\Users\Admin\AppData\Local\Temp\Decoder.exeMD5
e37021a3f1418f0e8e16fbcaeb983208
SHA17d800522aae223974b99775f8b56be8029474276
SHA2569d19d1befd5def35739d3e1fd3432fde6a11577c393a8ffe3651bb170fba9eab
SHA51249f643e9068ac68effdd597ebe89680d4e6a7d19b2b2c89bb71c3accd333ac8f20216be0f5f4bd13d0f709755332d7dab0a4f99591e1a3176de0fdfccb2f7adf
-
\Users\Admin\AppData\Local\Temp\Decoder.exeMD5
e37021a3f1418f0e8e16fbcaeb983208
SHA17d800522aae223974b99775f8b56be8029474276
SHA2569d19d1befd5def35739d3e1fd3432fde6a11577c393a8ffe3651bb170fba9eab
SHA51249f643e9068ac68effdd597ebe89680d4e6a7d19b2b2c89bb71c3accd333ac8f20216be0f5f4bd13d0f709755332d7dab0a4f99591e1a3176de0fdfccb2f7adf
-
\Users\Admin\AppData\Local\Temp\Decoder.exeMD5
e37021a3f1418f0e8e16fbcaeb983208
SHA17d800522aae223974b99775f8b56be8029474276
SHA2569d19d1befd5def35739d3e1fd3432fde6a11577c393a8ffe3651bb170fba9eab
SHA51249f643e9068ac68effdd597ebe89680d4e6a7d19b2b2c89bb71c3accd333ac8f20216be0f5f4bd13d0f709755332d7dab0a4f99591e1a3176de0fdfccb2f7adf
-
\Users\Admin\AppData\Local\Temp\Decoder.exeMD5
e37021a3f1418f0e8e16fbcaeb983208
SHA17d800522aae223974b99775f8b56be8029474276
SHA2569d19d1befd5def35739d3e1fd3432fde6a11577c393a8ffe3651bb170fba9eab
SHA51249f643e9068ac68effdd597ebe89680d4e6a7d19b2b2c89bb71c3accd333ac8f20216be0f5f4bd13d0f709755332d7dab0a4f99591e1a3176de0fdfccb2f7adf
-
\Users\Admin\AppData\Local\Temp\Decoder.exeMD5
e37021a3f1418f0e8e16fbcaeb983208
SHA17d800522aae223974b99775f8b56be8029474276
SHA2569d19d1befd5def35739d3e1fd3432fde6a11577c393a8ffe3651bb170fba9eab
SHA51249f643e9068ac68effdd597ebe89680d4e6a7d19b2b2c89bb71c3accd333ac8f20216be0f5f4bd13d0f709755332d7dab0a4f99591e1a3176de0fdfccb2f7adf
-
\Users\Admin\AppData\Local\Temp\Decoder.exeMD5
e37021a3f1418f0e8e16fbcaeb983208
SHA17d800522aae223974b99775f8b56be8029474276
SHA2569d19d1befd5def35739d3e1fd3432fde6a11577c393a8ffe3651bb170fba9eab
SHA51249f643e9068ac68effdd597ebe89680d4e6a7d19b2b2c89bb71c3accd333ac8f20216be0f5f4bd13d0f709755332d7dab0a4f99591e1a3176de0fdfccb2f7adf
-
\Users\Admin\AppData\Local\Temp\Decoder.exeMD5
e37021a3f1418f0e8e16fbcaeb983208
SHA17d800522aae223974b99775f8b56be8029474276
SHA2569d19d1befd5def35739d3e1fd3432fde6a11577c393a8ffe3651bb170fba9eab
SHA51249f643e9068ac68effdd597ebe89680d4e6a7d19b2b2c89bb71c3accd333ac8f20216be0f5f4bd13d0f709755332d7dab0a4f99591e1a3176de0fdfccb2f7adf
-
\Users\Admin\AppData\Local\Temp\Decoder.exeMD5
e37021a3f1418f0e8e16fbcaeb983208
SHA17d800522aae223974b99775f8b56be8029474276
SHA2569d19d1befd5def35739d3e1fd3432fde6a11577c393a8ffe3651bb170fba9eab
SHA51249f643e9068ac68effdd597ebe89680d4e6a7d19b2b2c89bb71c3accd333ac8f20216be0f5f4bd13d0f709755332d7dab0a4f99591e1a3176de0fdfccb2f7adf
-
\Users\Admin\AppData\Local\Temp\Decoder.exeMD5
e37021a3f1418f0e8e16fbcaeb983208
SHA17d800522aae223974b99775f8b56be8029474276
SHA2569d19d1befd5def35739d3e1fd3432fde6a11577c393a8ffe3651bb170fba9eab
SHA51249f643e9068ac68effdd597ebe89680d4e6a7d19b2b2c89bb71c3accd333ac8f20216be0f5f4bd13d0f709755332d7dab0a4f99591e1a3176de0fdfccb2f7adf
-
\Users\Admin\AppData\Local\Temp\Decoder.exeMD5
e37021a3f1418f0e8e16fbcaeb983208
SHA17d800522aae223974b99775f8b56be8029474276
SHA2569d19d1befd5def35739d3e1fd3432fde6a11577c393a8ffe3651bb170fba9eab
SHA51249f643e9068ac68effdd597ebe89680d4e6a7d19b2b2c89bb71c3accd333ac8f20216be0f5f4bd13d0f709755332d7dab0a4f99591e1a3176de0fdfccb2f7adf
-
memory/464-6-0x0000000000000000-mapping.dmp
-
memory/608-37-0x0000000000000000-mapping.dmp
-
memory/608-15-0x0000000000000000-mapping.dmp
-
memory/608-43-0x0000000000000000-mapping.dmp
-
memory/608-19-0x0000000073980000-0x000000007406E000-memory.dmpFilesize
6.9MB
-
memory/608-21-0x00000000000A0000-0x00000000000A1000-memory.dmpFilesize
4KB
-
memory/608-41-0x0000000000000000-mapping.dmp
-
memory/608-13-0x0000000000000000-mapping.dmp
-
memory/608-39-0x0000000000000000-mapping.dmp
-
memory/672-26-0x0000000000000000-mapping.dmp
-
memory/672-28-0x0000000001F30000-0x0000000001F41000-memory.dmpFilesize
68KB
-
memory/672-46-0x0000000002510000-0x0000000002521000-memory.dmpFilesize
68KB
-
memory/836-11-0x0000000000000000-mapping.dmp
-
memory/1080-5-0x0000000000000000-mapping.dmp
-
memory/1084-25-0x0000000000000000-mapping.dmp
-
memory/1084-27-0x0000000001D00000-0x0000000001D11000-memory.dmpFilesize
68KB
-
memory/1084-45-0x0000000002550000-0x0000000002561000-memory.dmpFilesize
68KB
-
memory/1256-16-0x0000000000000000-mapping.dmp
-
memory/1256-38-0x0000000000000000-mapping.dmp
-
memory/1256-40-0x0000000000000000-mapping.dmp
-
memory/1256-42-0x0000000000000000-mapping.dmp
-
memory/1256-20-0x0000000073980000-0x000000007406E000-memory.dmpFilesize
6.9MB
-
memory/1256-44-0x0000000000000000-mapping.dmp
-
memory/1256-14-0x0000000000000000-mapping.dmp
-
memory/1424-9-0x0000000000000000-mapping.dmp
-
memory/1496-8-0x0000000000000000-mapping.dmp
-
memory/1640-4-0x0000000000000000-mapping.dmp
-
memory/1824-0-0x000007FEF5160000-0x000007FEF5B4C000-memory.dmpFilesize
9.9MB
-
memory/1824-3-0x000000001AD70000-0x000000001ADE0000-memory.dmpFilesize
448KB
-
memory/1824-1-0x00000000010E0000-0x00000000010E1000-memory.dmpFilesize
4KB