Analysis
-
max time kernel
169s -
max time network
178s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
31-01-2022 03:59
Static task
static1
Behavioral task
behavioral1
Sample
3756c1fcf3f6404582a19c5e1fd23aa043cb71e85700bdf6b0e6df80593ad565.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3756c1fcf3f6404582a19c5e1fd23aa043cb71e85700bdf6b0e6df80593ad565.exe
Resource
win10-en-20211208
General
-
Target
3756c1fcf3f6404582a19c5e1fd23aa043cb71e85700bdf6b0e6df80593ad565.exe
-
Size
32KB
-
MD5
0793e40192cb5916d1aeb03e045ddd58
-
SHA1
4f07512ff629cae2e4175a3e1e4235fa8cee3bfe
-
SHA256
3756c1fcf3f6404582a19c5e1fd23aa043cb71e85700bdf6b0e6df80593ad565
-
SHA512
2b5bfbfc151861dead86d241ad3a6afb76142cb4a6fd2811abfebab4f3026af92f0aee25865d778672a3c8cf0f3496f707a1efba1212067a2471d66b1a7b3226
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3680 created 844 3680 WerFault.exe 3756c1fcf3f6404582a19c5e1fd23aa043cb71e85700bdf6b0e6df80593ad565.exe -
Processes:
resource yara_rule behavioral2/memory/844-118-0x0000000000400000-0x000000000041B396-memory.dmp themida -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3680 844 WerFault.exe 3756c1fcf3f6404582a19c5e1fd23aa043cb71e85700bdf6b0e6df80593ad565.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe 3680 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3680 WerFault.exe Token: SeBackupPrivilege 3680 WerFault.exe Token: SeDebugPrivilege 3680 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3756c1fcf3f6404582a19c5e1fd23aa043cb71e85700bdf6b0e6df80593ad565.exe"C:\Users\Admin\AppData\Local\Temp\3756c1fcf3f6404582a19c5e1fd23aa043cb71e85700bdf6b0e6df80593ad565.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 844 -s 5922⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/844-118-0x0000000000400000-0x000000000041B396-memory.dmpFilesize
108KB
-
memory/844-119-0x0000000000400000-0x000000000041B396-memory.dmpFilesize
108KB
-
memory/844-120-0x0000000002240000-0x0000000002241000-memory.dmpFilesize
4KB
-
memory/844-121-0x0000000002230000-0x0000000002231000-memory.dmpFilesize
4KB
-
memory/844-122-0x00000000021E0000-0x000000000220D000-memory.dmpFilesize
180KB
-
memory/844-123-0x0000000000480000-0x0000000000481000-memory.dmpFilesize
4KB
-
memory/844-124-0x0000000000480000-0x0000000000489000-memory.dmpFilesize
36KB
-
memory/844-126-0x0000000002210000-0x0000000002211000-memory.dmpFilesize
4KB
-
memory/844-125-0x0000000000630000-0x0000000000631000-memory.dmpFilesize
4KB
-
memory/844-127-0x0000000002220000-0x0000000002221000-memory.dmpFilesize
4KB
-
memory/844-128-0x00000000022A0000-0x00000000022A6000-memory.dmpFilesize
24KB