Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exe
Resource
win10v2004-20231025-en
General
-
Target
f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exe
-
Size
6.2MB
-
MD5
806e990b146effe15fed9ba9f96f94e7
-
SHA1
ddadde0227c35ca9c12cd50bb7ba12534d32ff37
-
SHA256
f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264
-
SHA512
eb2cbc1dac6a3b436aff690cc172a83db30fd40a5b97cb2a5750e6c68b2a5823036dfe662cad92a2b90b1eca090d146745db26d9ba4d843cc3f8393e7a05eaed
-
SSDEEP
98304:DCR8O85/PGEuT7o0Fu1W8XEfYKlmpYzPouT7o0Fu1W8XEfYd:DCaO85nGzT8EfWyQuT8Efy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4176 f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exe -
Executes dropped EXE 1 IoCs
pid Process 4176 f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 14 IoCs
pid pid_target Process procid_target 4408 4056 WerFault.exe 85 4416 4176 WerFault.exe 94 3292 4176 WerFault.exe 94 4816 4176 WerFault.exe 94 220 4176 WerFault.exe 94 1404 4176 WerFault.exe 94 2360 4176 WerFault.exe 94 1428 4176 WerFault.exe 94 1480 4176 WerFault.exe 94 764 4176 WerFault.exe 94 1620 4176 WerFault.exe 94 32 4176 WerFault.exe 94 2380 4176 WerFault.exe 94 4808 4176 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4176 f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exe 4176 f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4056 f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4176 f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4056 wrote to memory of 4176 4056 f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exe 94 PID 4056 wrote to memory of 4176 4056 f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exe 94 PID 4056 wrote to memory of 4176 4056 f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exe"C:\Users\Admin\AppData\Local\Temp\f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 3442⤵
- Program crash
PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exeC:\Users\Admin\AppData\Local\Temp\f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:4176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 3443⤵
- Program crash
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 6283⤵
- Program crash
PID:3292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 6363⤵
- Program crash
PID:4816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 6363⤵
- Program crash
PID:220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 7083⤵
- Program crash
PID:1404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 8883⤵
- Program crash
PID:2360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 14203⤵
- Program crash
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 13963⤵
- Program crash
PID:1480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 16843⤵
- Program crash
PID:764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 14923⤵
- Program crash
PID:1620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 15043⤵
- Program crash
PID:32
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 15443⤵
- Program crash
PID:2380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 6523⤵
- Program crash
PID:4808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4056 -ip 40561⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4176 -ip 41761⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4176 -ip 41761⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4176 -ip 41761⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4176 -ip 41761⤵PID:588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4176 -ip 41761⤵PID:2432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4176 -ip 41761⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4176 -ip 41761⤵PID:2560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4176 -ip 41761⤵PID:3500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4176 -ip 41761⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4176 -ip 41761⤵PID:1468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4176 -ip 41761⤵PID:2984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4176 -ip 41761⤵PID:2984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4176 -ip 41761⤵PID:1004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\f320e5bf0b04959fee08c1a5f83a809ccb84c62c5f793f39ca33d8b5bbbe6264.exe
Filesize6.2MB
MD5e482b2658ab374d53c0258c2c9ea5f50
SHA151550ada52261702909a7507601497ce44fd3b00
SHA2560b76a693acdec1df5782bf293cb7c4349501b631c6defceb2c699114c387f617
SHA5124d6a8e9e47422d3b0c2778ead8ac45a0f9c4f5d6042d469defea7336db2baccd9b9da0882f88a3a6ff396e3bccce7de6eb98d3e60a9827a0f051354218a9c2f2