Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2022 07:59
Static task
static1
Behavioral task
behavioral1
Sample
a9e6db79464d9992a31482f0cf46b96a2646bcac70545692fb1e7fd703624486.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9e6db79464d9992a31482f0cf46b96a2646bcac70545692fb1e7fd703624486.exe
Resource
win10v2004-20220812-en
General
-
Target
a9e6db79464d9992a31482f0cf46b96a2646bcac70545692fb1e7fd703624486.exe
-
Size
358KB
-
MD5
d0cb1bcecc615db6be72c5c68576932e
-
SHA1
c127d890420d9205d3426d3edb5746678d0047cd
-
SHA256
a9e6db79464d9992a31482f0cf46b96a2646bcac70545692fb1e7fd703624486
-
SHA512
38e7df8234ceab44dd77b322526e23174cb69f54dc0eb4c547747ad25f833197cd815609780b5cac0993892a6793564a1ea1daf4c1e57896fe0b714f963e57ca
-
SSDEEP
6144:WYHpe4aM7iXeBPcnRE9LxiLAW+fDqRWrmzuOlHJvXwyCTlOp2K:WL4f2OBPce9LxiT0W8SrpvXwyCTl
Malware Config
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1932-133-0x0000000000620000-0x0000000000664000-memory.dmp family_onlylogger behavioral2/memory/1932-134-0x0000000000400000-0x0000000000484000-memory.dmp family_onlylogger -
Program crash 8 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4116 1932 WerFault.exe a9e6db79464d9992a31482f0cf46b96a2646bcac70545692fb1e7fd703624486.exe 1192 1932 WerFault.exe a9e6db79464d9992a31482f0cf46b96a2646bcac70545692fb1e7fd703624486.exe 1284 1932 WerFault.exe a9e6db79464d9992a31482f0cf46b96a2646bcac70545692fb1e7fd703624486.exe 1524 1932 WerFault.exe a9e6db79464d9992a31482f0cf46b96a2646bcac70545692fb1e7fd703624486.exe 4112 1932 WerFault.exe a9e6db79464d9992a31482f0cf46b96a2646bcac70545692fb1e7fd703624486.exe 4984 1932 WerFault.exe a9e6db79464d9992a31482f0cf46b96a2646bcac70545692fb1e7fd703624486.exe 4416 1932 WerFault.exe a9e6db79464d9992a31482f0cf46b96a2646bcac70545692fb1e7fd703624486.exe 3024 1932 WerFault.exe a9e6db79464d9992a31482f0cf46b96a2646bcac70545692fb1e7fd703624486.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9e6db79464d9992a31482f0cf46b96a2646bcac70545692fb1e7fd703624486.exe"C:\Users\Admin\AppData\Local\Temp\a9e6db79464d9992a31482f0cf46b96a2646bcac70545692fb1e7fd703624486.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 6242⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 6442⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 7522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 7722⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 10162⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 10042⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 12962⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 15362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1932 -ip 19321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1932 -ip 19321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1932 -ip 19321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1932 -ip 19321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1932 -ip 19321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1932 -ip 19321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1932 -ip 19321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1932 -ip 19321⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1932-132-0x000000000068D000-0x00000000006B4000-memory.dmpFilesize
156KB
-
memory/1932-133-0x0000000000620000-0x0000000000664000-memory.dmpFilesize
272KB
-
memory/1932-134-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1932-135-0x000000000068D000-0x00000000006B4000-memory.dmpFilesize
156KB