Analysis
-
max time kernel
111s -
max time network
123s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
02-12-2021 16:06
Static task
static1
Behavioral task
behavioral1
Sample
fa35e20372326e5c1e12607df198b5c4.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
fa35e20372326e5c1e12607df198b5c4.exe
Resource
win10-en-20211014
General
-
Target
fa35e20372326e5c1e12607df198b5c4.exe
-
Size
1.4MB
-
MD5
fa35e20372326e5c1e12607df198b5c4
-
SHA1
a022779cbf0fca54ef969c8a86be95083f9e128d
-
SHA256
697e0cf2e6636fff9b8cbece1e67cc5db6b0eb58aace6bafd7656874a9462f49
-
SHA512
c24b55c429d6d77791ad3fca53685f9f2f72b336cdf4de62f95e10fb54c1f3e55cda511b78415bbba474131ce4fd9bc887d1086b30a557fb08207487541dd25e
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/3492-121-0x0000000006660000-0x0000000006681000-memory.dmp agile_net behavioral2/memory/3492-124-0x0000000005370000-0x000000000586E000-memory.dmp agile_net -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fa35e20372326e5c1e12607df198b5c4.exedescription pid process target process PID 3492 set thread context of 2816 3492 fa35e20372326e5c1e12607df198b5c4.exe fa35e20372326e5c1e12607df198b5c4.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3188 2816 WerFault.exe fa35e20372326e5c1e12607df198b5c4.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
fa35e20372326e5c1e12607df198b5c4.exeWerFault.exepid process 3492 fa35e20372326e5c1e12607df198b5c4.exe 3492 fa35e20372326e5c1e12607df198b5c4.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
fa35e20372326e5c1e12607df198b5c4.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3492 fa35e20372326e5c1e12607df198b5c4.exe Token: SeRestorePrivilege 3188 WerFault.exe Token: SeBackupPrivilege 3188 WerFault.exe Token: SeDebugPrivilege 3188 WerFault.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
fa35e20372326e5c1e12607df198b5c4.exedescription pid process target process PID 3492 wrote to memory of 2816 3492 fa35e20372326e5c1e12607df198b5c4.exe fa35e20372326e5c1e12607df198b5c4.exe PID 3492 wrote to memory of 2816 3492 fa35e20372326e5c1e12607df198b5c4.exe fa35e20372326e5c1e12607df198b5c4.exe PID 3492 wrote to memory of 2816 3492 fa35e20372326e5c1e12607df198b5c4.exe fa35e20372326e5c1e12607df198b5c4.exe PID 3492 wrote to memory of 2816 3492 fa35e20372326e5c1e12607df198b5c4.exe fa35e20372326e5c1e12607df198b5c4.exe PID 3492 wrote to memory of 2816 3492 fa35e20372326e5c1e12607df198b5c4.exe fa35e20372326e5c1e12607df198b5c4.exe PID 3492 wrote to memory of 2816 3492 fa35e20372326e5c1e12607df198b5c4.exe fa35e20372326e5c1e12607df198b5c4.exe PID 3492 wrote to memory of 2816 3492 fa35e20372326e5c1e12607df198b5c4.exe fa35e20372326e5c1e12607df198b5c4.exe PID 3492 wrote to memory of 2816 3492 fa35e20372326e5c1e12607df198b5c4.exe fa35e20372326e5c1e12607df198b5c4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa35e20372326e5c1e12607df198b5c4.exe"C:\Users\Admin\AppData\Local\Temp\fa35e20372326e5c1e12607df198b5c4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fa35e20372326e5c1e12607df198b5c4.exe"C:\Users\Admin\AppData\Local\Temp\fa35e20372326e5c1e12607df198b5c4.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 4603⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2816-128-0x000000000040202B-mapping.dmp
-
memory/2816-132-0x00000000007A0000-0x00000000007A6000-memory.dmpFilesize
24KB
-
memory/2816-129-0x00000000007A0000-0x00000000007A6000-memory.dmpFilesize
24KB
-
memory/3492-122-0x0000000006700000-0x0000000006701000-memory.dmpFilesize
4KB
-
memory/3492-120-0x0000000005370000-0x000000000586E000-memory.dmpFilesize
5.0MB
-
memory/3492-121-0x0000000006660000-0x0000000006681000-memory.dmpFilesize
132KB
-
memory/3492-115-0x00000000009E0000-0x00000000009E1000-memory.dmpFilesize
4KB
-
memory/3492-123-0x00000000066C0000-0x00000000066C1000-memory.dmpFilesize
4KB
-
memory/3492-124-0x0000000005370000-0x000000000586E000-memory.dmpFilesize
5.0MB
-
memory/3492-125-0x0000000006A40000-0x0000000006A4B000-memory.dmpFilesize
44KB
-
memory/3492-126-0x00000000093C0000-0x00000000093C1000-memory.dmpFilesize
4KB
-
memory/3492-119-0x00000000054B0000-0x00000000054B1000-memory.dmpFilesize
4KB
-
memory/3492-118-0x0000000005410000-0x0000000005411000-memory.dmpFilesize
4KB
-
memory/3492-117-0x0000000005870000-0x0000000005871000-memory.dmpFilesize
4KB