Analysis
-
max time kernel
145s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exe
Resource
win10v2004-20231023-en
General
-
Target
6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exe
-
Size
1012KB
-
MD5
b14b1391143a45874f0664db05361125
-
SHA1
1617247c3e82390af0a7aa53c27cdb0d61a6db9e
-
SHA256
6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06
-
SHA512
e8bc5e748a80ae71ac79379cb624270212d2660c99d5bec608060cf3d6d1c1ebb6c27596c3fb6a02eb036a4d87bdbb959aba76c1221ed85c50622adb374428db
-
SSDEEP
24576:sBuIFcu+vsIRIoYf/oNrBkEU4QJ41YBS2tBrwa/ZSX77Lv+f6T8E:sBR2PfRIJHSkEyhDUgQbD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4116 6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exe -
Executes dropped EXE 1 IoCs
pid Process 4116 6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 11 IoCs
pid pid_target Process procid_target 2428 4116 WerFault.exe 94 3832 4116 WerFault.exe 94 3884 4116 WerFault.exe 94 4364 4116 WerFault.exe 94 2588 4116 WerFault.exe 94 2276 4116 WerFault.exe 94 3800 4116 WerFault.exe 94 4364 4116 WerFault.exe 94 4856 4116 WerFault.exe 94 5080 4116 WerFault.exe 94 792 4116 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4116 6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exe 4116 6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1544 6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4116 6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1544 wrote to memory of 4116 1544 6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exe 94 PID 1544 wrote to memory of 4116 1544 6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exe 94 PID 1544 wrote to memory of 4116 1544 6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exe"C:\Users\Admin\AppData\Local\Temp\6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exeC:\Users\Admin\AppData\Local\Temp\6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:4116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 3443⤵
- Program crash
PID:2428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 6283⤵
- Program crash
PID:3832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 6763⤵
- Program crash
PID:3884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 6763⤵
- Program crash
PID:4364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 7203⤵
- Program crash
PID:2588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 8883⤵
- Program crash
PID:2276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 14043⤵
- Program crash
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 14683⤵
- Program crash
PID:4364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 14843⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 14723⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 15403⤵
- Program crash
PID:792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1544 -ip 15441⤵PID:724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4116 -ip 41161⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4116 -ip 41161⤵PID:2664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4116 -ip 41161⤵PID:3500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4116 -ip 41161⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4116 -ip 41161⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4116 -ip 41161⤵PID:2112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4116 -ip 41161⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4116 -ip 41161⤵PID:2684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4116 -ip 41161⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4116 -ip 41161⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4116 -ip 41161⤵PID:3352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6b556bee01c85dd2c803e602845e7442590feb1a68d5d3cbc63b7dc434818a06.exe
Filesize1012KB
MD541d02ebd4ab6f0a14ec9d1bd60cb26f6
SHA181588f0eba820effd26094216fe398d60944ff40
SHA2565c79f4489d7ce9f13d064703f8d7a558ae3f9defddb06a8ce7ae8686ca61436b
SHA51241e916f040fbe2ed86df7885e7145d7b0d3e93d8b4ef05bde9af284a8172cc7a48dda34a84844b41207685aedb10b304ebdf5926eeac1586ad5c6fb900e3a3ba