Analysis
-
max time kernel
133s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exe
Resource
win10v2004-20231025-en
General
-
Target
9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exe
-
Size
1.5MB
-
MD5
ac27881462e78236a394e70186e17963
-
SHA1
bdb09935c11d5685c7de01d80e50252508d4c855
-
SHA256
9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff
-
SHA512
a1afd123dca6a5087952484f3602c694f9f7fe3074120a6cce95f8dcef4ba6cf9d561f3a75a2e6704f11ea163f7b168ffbe5069fdfc34f31e488b5a1a2839629
-
SSDEEP
24576:glMKg390bwMij7ep/Jxny4AZ+M5w8UEP3lQULa/ZSC77Lv+f6T8AN7a0PRI4ust5:glPBiXenxnypZc0QULgRbP77a4usjFuS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1684 9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exe -
Executes dropped EXE 1 IoCs
pid Process 1684 9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 13 IoCs
pid pid_target Process procid_target 2344 3576 WerFault.exe 85 4120 1684 WerFault.exe 94 3084 1684 WerFault.exe 94 5016 1684 WerFault.exe 94 452 1684 WerFault.exe 94 1896 1684 WerFault.exe 94 3924 1684 WerFault.exe 94 3532 1684 WerFault.exe 94 3736 1684 WerFault.exe 94 1232 1684 WerFault.exe 94 648 1684 WerFault.exe 94 4728 1684 WerFault.exe 94 3312 1684 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1684 9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exe 1684 9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3576 9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1684 9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3576 wrote to memory of 1684 3576 9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exe 94 PID 3576 wrote to memory of 1684 3576 9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exe 94 PID 3576 wrote to memory of 1684 3576 9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exe"C:\Users\Admin\AppData\Local\Temp\9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 3442⤵
- Program crash
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exeC:\Users\Admin\AppData\Local\Temp\9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 3523⤵
- Program crash
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 6203⤵
- Program crash
PID:3084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 6203⤵
- Program crash
PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 6723⤵
- Program crash
PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 7203⤵
- Program crash
PID:1896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 9203⤵
- Program crash
PID:3924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 14003⤵
- Program crash
PID:3532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 14483⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 14643⤵
- Program crash
PID:1232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 17003⤵
- Program crash
PID:648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 16803⤵
- Program crash
PID:4728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 6323⤵
- Program crash
PID:3312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3576 -ip 35761⤵PID:860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1684 -ip 16841⤵PID:4884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1684 -ip 16841⤵PID:1380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1684 -ip 16841⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1684 -ip 16841⤵PID:4320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1684 -ip 16841⤵PID:4252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1684 -ip 16841⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1684 -ip 16841⤵PID:4084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1684 -ip 16841⤵PID:2852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1684 -ip 16841⤵PID:4552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1684 -ip 16841⤵PID:1172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1684 -ip 16841⤵PID:1836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1684 -ip 16841⤵PID:2124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\9145a662cdc0852938e3366cce182a3c5aca4ec219cf4fd639133189e34940ff.exe
Filesize1.5MB
MD52361bfafac2c2ee735225f3f896f11d8
SHA1a10c6773e45ad9763270cde7030d647a7863a702
SHA25608a2e56969516d987b86eb596c872780c70f6f67da49c649e634d78b40c40e50
SHA512850b232e72a411ed8b26e39d0925c7563be95634b1b1faeaa17c60aa7c6c05436c371af6e12499a137e9f11d08ed4fb0e0d592d411ba792a631010043cc878f0