Analysis
-
max time kernel
155s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2023 18:54
Static task
static1
Behavioral task
behavioral1
Sample
8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exe
Resource
win10v2004-20231023-en
General
-
Target
8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exe
-
Size
1012KB
-
MD5
4bfedff60fc320a923f5c02faf8c4503
-
SHA1
8b89c38bdae06491f676b9229c87b4dfd8b26572
-
SHA256
8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9
-
SHA512
2280f1a2f348a637647e327e316d575c4b5b7c93484082431b61c390e9cfd56b018bc9c4171d63c084bea10e6b0a060085011398baa6f491c3944c1b2b438f50
-
SSDEEP
24576:x1n599aPIIJzv4fZXTZz7koKla/ZSL77Lv+f6T8E:L59hIJETZzYhgwbD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4028 8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exe -
Executes dropped EXE 1 IoCs
pid Process 4028 8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 13 IoCs
pid pid_target Process procid_target 2432 4880 WerFault.exe 85 4048 4028 WerFault.exe 94 2196 4028 WerFault.exe 94 4432 4028 WerFault.exe 94 3596 4028 WerFault.exe 94 1916 4028 WerFault.exe 94 1384 4028 WerFault.exe 94 1908 4028 WerFault.exe 94 3928 4028 WerFault.exe 94 4120 4028 WerFault.exe 94 1628 4028 WerFault.exe 94 4984 4028 WerFault.exe 94 4888 4028 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4028 8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exe 4028 8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4880 8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4028 8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4880 wrote to memory of 4028 4880 8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exe 94 PID 4880 wrote to memory of 4028 4880 8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exe 94 PID 4880 wrote to memory of 4028 4880 8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exe"C:\Users\Admin\AppData\Local\Temp\8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 3442⤵
- Program crash
PID:2432
-
-
C:\Users\Admin\AppData\Local\Temp\8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exeC:\Users\Admin\AppData\Local\Temp\8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:4028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 3443⤵
- Program crash
PID:4048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 6283⤵
- Program crash
PID:2196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 6483⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 6483⤵
- Program crash
PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 6923⤵
- Program crash
PID:1916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 9043⤵
- Program crash
PID:1384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 14043⤵
- Program crash
PID:1908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 14483⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 14923⤵
- Program crash
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 15483⤵
- Program crash
PID:1628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 15283⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 10003⤵
- Program crash
PID:4888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4880 -ip 48801⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4028 -ip 40281⤵PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4028 -ip 40281⤵PID:500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4028 -ip 40281⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4028 -ip 40281⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4028 -ip 40281⤵PID:2900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4028 -ip 40281⤵PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4028 -ip 40281⤵PID:556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4028 -ip 40281⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4028 -ip 40281⤵PID:3064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4028 -ip 40281⤵PID:2320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4028 -ip 40281⤵PID:2752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4028 -ip 40281⤵PID:780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8bf2c058bd26ac7883596f6908365776abca7f1139a4c8272eee0dec3ec76fb9.exe
Filesize1012KB
MD504b3bee22ebb0f7e3170989ac466e714
SHA113bc5aac44ffca0c0b27bdddd856e4c6648fcdcc
SHA25679d1d4d7dcb9a4d44e62a48e996ebb76928d3929c8048378b3cd24259fc7cd29
SHA512c2b84130e28d2a01939bf5dde64e3726b61246e0b5cff0f9b1bb2d269ac584d24fb978eed689463e0d43ea16d5e2a543bf81953650b9d49ebcf9d0920c93b5af