Analysis
-
max time kernel
40s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 08:28
Behavioral task
behavioral1
Sample
2a3c5075363be6ad673b7c6daca4acfbf14c537e3951b784f8f24ebc39352cb0.rar
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2a3c5075363be6ad673b7c6daca4acfbf14c537e3951b784f8f24ebc39352cb0.rar
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
faturanet.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
faturanet.exe
Resource
win10v2004-20221111-en
General
-
Target
faturanet.exe
-
Size
212KB
-
MD5
4f964a479250bc6307c448323eba3dda
-
SHA1
52c5950806b0e2126caec6c58aba7d7ec3e4ea4f
-
SHA256
f90a15ae0725ee8d3b2f1a6d840370ef0c7b463537688f02250c5a53dbcf4479
-
SHA512
13491dafe9e92dc0e60f39eaf23b020eb8f1c3aa7ac3450aafa07db2f50e89b74361e36b06a9335ee7502198233640d446251fc1a5c4bc5802f68739468bc0ac
-
SSDEEP
6144:2QBgEWmvH1nmXHJF3zB2ivUDec7BEOmZMi:EERvwZNZvCec7LuMi
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral3/memory/1304-55-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral3/memory/1304-57-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
faturanet.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run faturanet.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\RunDLL32 = "C:\\Users\\Admin\\Desktop\\rynksfqes\\rynksfqes.exe" faturanet.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1300 1304 WerFault.exe faturanet.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
faturanet.exedescription pid process target process PID 1304 wrote to memory of 1300 1304 faturanet.exe WerFault.exe PID 1304 wrote to memory of 1300 1304 faturanet.exe WerFault.exe PID 1304 wrote to memory of 1300 1304 faturanet.exe WerFault.exe PID 1304 wrote to memory of 1300 1304 faturanet.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\faturanet.exe"C:\Users\Admin\AppData\Local\Temp\faturanet.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 4802⤵
- Program crash
PID:1300
-