Analysis
-
max time kernel
12s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
08-08-2021 18:08
Static task
static1
Behavioral task
behavioral1
Sample
64b4db1046496c57a0779befc72c264d.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
64b4db1046496c57a0779befc72c264d.exe
-
Size
448KB
-
MD5
64b4db1046496c57a0779befc72c264d
-
SHA1
71cfbee47a5b6f0bb18bba914b5896b3037cfeab
-
SHA256
d5e0eecc3da1a2bc3f36df0a05c0ce116def64c9e6c72224c8988a671ed7fe8a
-
SHA512
d59bf100032299d10e6737d9489202545ce4cf3b403407da0ba0fbbd0f72b502478ce3557008ad785e146041a100e2e48ba1d9414a983d954cea7437c424f3da
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 4040 created 3680 4040 WerFault.exe 67 -
DarkVNC Payload 3 IoCs
resource yara_rule behavioral2/memory/3680-114-0x0000000004900000-0x0000000004988000-memory.dmp darkvnc behavioral2/memory/3680-116-0x0000000000400000-0x0000000002CA6000-memory.dmp darkvnc behavioral2/memory/3048-118-0x00000228FDF20000-0x00000228FDFEA000-memory.dmp darkvnc -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3680 set thread context of 3048 3680 64b4db1046496c57a0779befc72c264d.exe 76 -
Program crash 1 IoCs
pid pid_target Process procid_target 4040 3680 WerFault.exe 67 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3680 64b4db1046496c57a0779befc72c264d.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 4040 WerFault.exe Token: SeBackupPrivilege 4040 WerFault.exe Token: SeDebugPrivilege 4040 WerFault.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3680 wrote to memory of 3048 3680 64b4db1046496c57a0779befc72c264d.exe 76 PID 3680 wrote to memory of 3048 3680 64b4db1046496c57a0779befc72c264d.exe 76 PID 3680 wrote to memory of 3048 3680 64b4db1046496c57a0779befc72c264d.exe 76 PID 3680 wrote to memory of 3048 3680 64b4db1046496c57a0779befc72c264d.exe 76 PID 3680 wrote to memory of 3048 3680 64b4db1046496c57a0779befc72c264d.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\64b4db1046496c57a0779befc72c264d.exe"C:\Users\Admin\AppData\Local\Temp\64b4db1046496c57a0779befc72c264d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe2⤵PID:3048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 4762⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4040
-