Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-06-2022 19:05
Static task
static1
Behavioral task
behavioral1
Sample
2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe
Resource
win7-20220414-en
General
-
Target
2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe
-
Size
573KB
-
MD5
8b16960a57d58c33caaa19bc139e3ebb
-
SHA1
f86cad09d3e1502f1b441148ea4c2bb47d3e6d38
-
SHA256
2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632
-
SHA512
53dd710d1c2f2f9a996065f03000b617466ff25d26d109c1fe35e0a1a88f7a54dcd2e982bd44d39d52e5cf2ce6857ea4fa0f659b26a53034c7a762920be16085
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
GetX64BTIT.exepid process 4432 GetX64BTIT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 api.ipify.org 14 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Program crash 19 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2480 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 1652 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 4248 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 4300 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 4728 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2704 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 328 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 3840 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 1204 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 1264 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 3004 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 1196 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 4256 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2208 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2312 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 1984 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2476 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 4304 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 1744 2676 WerFault.exe 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exepid process 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exepid process 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exedescription pid process target process PID 2676 wrote to memory of 4432 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe GetX64BTIT.exe PID 2676 wrote to memory of 4432 2676 2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe GetX64BTIT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe"C:\Users\Admin\AppData\Local\Temp\2fc09dd0129e630bd1ab8e6e7406dedab6a21d366bfabf207b6085c8eb478632.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 6122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 6442⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 6442⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 8842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 9322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 10842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 10922⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 10882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 10922⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 10882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 6682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 10962⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 11002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 11322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 10802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 11722⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 11802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 11802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 11562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2676 -ip 26761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2676 -ip 26761⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exeFilesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exeFilesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
C:\Users\Admin\AppData\Local\Temp\x64btit.txtFilesize
28B
MD5c9f149dce94b8e990fcb9db13ec43b65
SHA1fd70e696306ae1bed76506bbfe36f8b4a9d496a0
SHA2566990661403d1164469f338f711bce0287f8242f0fea99c5caddb15e7e3387947
SHA512c636d951938b2e93e9f80d64ffb1209f30fb13e2b1d9f35ff9f4d0f1daba76502d242ed3c9fb1dffb1577c144a17b5cc57d84c0ac7ea3207fc8d7627ab297b23
-
memory/2676-133-0x0000000000897000-0x00000000008EB000-memory.dmpFilesize
336KB
-
memory/2676-134-0x0000000000980000-0x00000000009D4000-memory.dmpFilesize
336KB
-
memory/2676-135-0x0000000000400000-0x0000000000513000-memory.dmpFilesize
1.1MB
-
memory/2676-136-0x00000000009E0000-0x0000000000A7F000-memory.dmpFilesize
636KB
-
memory/2676-141-0x0000000000897000-0x00000000008EB000-memory.dmpFilesize
336KB
-
memory/2676-142-0x00000000009E0000-0x0000000000A7F000-memory.dmpFilesize
636KB
-
memory/4432-137-0x0000000000000000-mapping.dmp