Analysis
-
max time kernel
136s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2023 18:52
Static task
static1
Behavioral task
behavioral1
Sample
5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exe
Resource
win10v2004-20231025-en
General
-
Target
5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exe
-
Size
1012KB
-
MD5
9c4c397b9ea53c3aceabb7fa9273d3fe
-
SHA1
871aa3a55ecd6f17535984676779b697314f4746
-
SHA256
5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa
-
SHA512
eb043d340e57513a0cb42d1bf385d7720d2377d3f6175dc0dda07263fc0e94c81300e02af731a8108b922bd66e250425f8f724472cf11332fd99acb91e52b0db
-
SSDEEP
24576:n5wAfzZjRCHiaGRc3G/LiYlrea/ZSL77Lv+f6T8E:n55zCCplbl6gwbD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4504 5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exe -
Executes dropped EXE 1 IoCs
pid Process 4504 5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 16 IoCs
pid pid_target Process procid_target 4780 2028 WerFault.exe 85 4484 4504 WerFault.exe 94 3228 4504 WerFault.exe 94 1040 4504 WerFault.exe 94 2180 4504 WerFault.exe 94 4588 4504 WerFault.exe 94 3580 4504 WerFault.exe 94 2012 4504 WerFault.exe 94 5032 4504 WerFault.exe 94 404 4504 WerFault.exe 94 5096 4504 WerFault.exe 94 2736 4504 WerFault.exe 94 4884 4504 WerFault.exe 94 2404 4504 WerFault.exe 94 4368 4504 WerFault.exe 94 3960 4504 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4504 5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exe 4504 5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2028 5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4504 5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2028 wrote to memory of 4504 2028 5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exe 94 PID 2028 wrote to memory of 4504 2028 5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exe 94 PID 2028 wrote to memory of 4504 2028 5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exe"C:\Users\Admin\AppData\Local\Temp\5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 3442⤵
- Program crash
PID:4780
-
-
C:\Users\Admin\AppData\Local\Temp\5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exeC:\Users\Admin\AppData\Local\Temp\5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:4504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 3443⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 6363⤵
- Program crash
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 6443⤵
- Program crash
PID:1040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 6443⤵
- Program crash
PID:2180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 7203⤵
- Program crash
PID:4588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 9203⤵
- Program crash
PID:3580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 14203⤵
- Program crash
PID:2012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 14443⤵
- Program crash
PID:5032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 14923⤵
- Program crash
PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 17243⤵
- Program crash
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 14883⤵
- Program crash
PID:2736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 15643⤵
- Program crash
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 17123⤵
- Program crash
PID:2404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 14243⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 14803⤵
- Program crash
PID:3960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2028 -ip 20281⤵PID:2776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4504 -ip 45041⤵PID:2120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4504 -ip 45041⤵PID:2352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4504 -ip 45041⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4504 -ip 45041⤵PID:468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4504 -ip 45041⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4504 -ip 45041⤵PID:3760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4504 -ip 45041⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4504 -ip 45041⤵PID:1984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4504 -ip 45041⤵PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4504 -ip 45041⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4504 -ip 45041⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4504 -ip 45041⤵PID:4080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4504 -ip 45041⤵PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4504 -ip 45041⤵PID:1228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4504 -ip 45041⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5fed54b50588ce2ccb920706be3331d662d2ea2098bcf2b4b8856f3c5a264caa.exe
Filesize1012KB
MD5d50fc7b62ffdfc456d42b4cb497bd7b8
SHA1a4bca2408c27d1e9f3929f7fcff8dc7c2e99fc64
SHA256f8b50349030c1b019228f5e958ab394c0f463ee0fd547cecac55b7cb8d6ee5d1
SHA5126fb083c2097229cb54dfaebe369e63dfbda6f0ffa8a04be26b7ad22308b234a8606e80affad66503f96cb15509ec58bdbdf3a91f3b2583473ba141f650a4e9c9