Analysis
-
max time kernel
171s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:05
Static task
static1
Behavioral task
behavioral1
Sample
d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe
Resource
win10v2004-20221111-en
General
-
Target
d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe
-
Size
523KB
-
MD5
447e6bbe593e938286009d7277fd4e20
-
SHA1
35f9c56a57125bbb37942119ddfce10e00a32ed1
-
SHA256
d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc
-
SHA512
30b8da45aa338be9a99f95d66fd9b5dbeb95f61f0718c7eaf0bfc04753ff54a5b3ca8de81f36c98e69eb5ca2fed4e3ae2e6c245b97afbf199598cdb2706f8b3b
-
SSDEEP
12288:Fy48WEX0PAaDvdx8ZKEg2hyeJxVGeDQpgQgtf2LJVO7Lz:FynqIwdxcbg2h0Yv2K3z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exepid process 4788 d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe upx C:\Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe upx behavioral2/memory/4788-136-0x0000000000400000-0x0000000000461000-memory.dmp upx behavioral2/memory/4788-137-0x0000000000400000-0x0000000000461000-memory.dmp upx -
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3952 3152 WerFault.exe d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe 4260 3152 WerFault.exe d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe 8 4788 WerFault.exe d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe 2088 3152 WerFault.exe d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exedescription pid process target process PID 3152 wrote to memory of 4788 3152 d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe PID 3152 wrote to memory of 4788 3152 d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe PID 3152 wrote to memory of 4788 3152 d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe"C:\Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 4762⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exeC:\Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 2603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 4722⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 4802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 3152 -ip 31521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3152 -ip 31521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4788 -ip 47881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3152 -ip 31521⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exeFilesize
155KB
MD560b4a01f8e198b8857f674ca6a809d75
SHA16b9667a5210cf76d730e4305ebc5417187009d2a
SHA2566e9f1ec2429a8bedf6a886d97a22d4fc37cec011f697fd6368d5ebb3b5b01071
SHA512b7045cc893bccfe3cc7881c42ad903dc23962702c24e7c797071a68a7463b27822a3b77a82fd5ed1c939f12fe4f1ff944c9a436097f96bf2ca00732595236744
-
C:\Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exeFilesize
155KB
MD560b4a01f8e198b8857f674ca6a809d75
SHA16b9667a5210cf76d730e4305ebc5417187009d2a
SHA2566e9f1ec2429a8bedf6a886d97a22d4fc37cec011f697fd6368d5ebb3b5b01071
SHA512b7045cc893bccfe3cc7881c42ad903dc23962702c24e7c797071a68a7463b27822a3b77a82fd5ed1c939f12fe4f1ff944c9a436097f96bf2ca00732595236744
-
memory/3152-132-0x0000000000400000-0x00000000004F9000-memory.dmpFilesize
996KB
-
memory/3152-138-0x0000000000400000-0x00000000004F9000-memory.dmpFilesize
996KB
-
memory/4788-133-0x0000000000000000-mapping.dmp
-
memory/4788-136-0x0000000000400000-0x0000000000461000-memory.dmpFilesize
388KB
-
memory/4788-137-0x0000000000400000-0x0000000000461000-memory.dmpFilesize
388KB