Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2023 19:06
Static task
static1
Behavioral task
behavioral1
Sample
4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exe
Resource
win10v2004-20231025-en
General
-
Target
4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exe
-
Size
2.1MB
-
MD5
9e5b8bd11d639d2c2a8b5847011260c9
-
SHA1
3ced05bb135af8ab9bc78bdf0f7085faa62bcc19
-
SHA256
4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474
-
SHA512
43da35faffeb8c6964ddc8b31872bf6db0dd3983dc6bedeaf4bbda5c21b9f60efef2e43d3ca9f80e158f42b3d9c43235016dfc9a5e8eae64f9c2a3817629483f
-
SSDEEP
49152:eYsjh8tjYNswedQNvvrueSnjECzs/EtL+U14w+loiTFd69/EtH:wOKedQ5unj0oM6e
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3880 4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exe -
Executes dropped EXE 1 IoCs
pid Process 3880 4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 13 IoCs
pid pid_target Process procid_target 2884 2876 WerFault.exe 85 2680 3880 WerFault.exe 95 4804 3880 WerFault.exe 95 2556 3880 WerFault.exe 95 3816 3880 WerFault.exe 95 116 3880 WerFault.exe 95 1488 3880 WerFault.exe 95 552 3880 WerFault.exe 95 4292 3880 WerFault.exe 95 1208 3880 WerFault.exe 95 4928 3880 WerFault.exe 95 4708 3880 WerFault.exe 95 812 3880 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3880 4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exe 3880 4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2876 4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3880 4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2876 wrote to memory of 3880 2876 4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exe 95 PID 2876 wrote to memory of 3880 2876 4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exe 95 PID 2876 wrote to memory of 3880 2876 4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exe"C:\Users\Admin\AppData\Local\Temp\4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 3442⤵
- Program crash
PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exeC:\Users\Admin\AppData\Local\Temp\4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:3880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 3443⤵
- Program crash
PID:2680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 6363⤵
- Program crash
PID:4804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 6443⤵
- Program crash
PID:2556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 6443⤵
- Program crash
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 6883⤵
- Program crash
PID:116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 9363⤵
- Program crash
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 13963⤵
- Program crash
PID:552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 13923⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 14923⤵
- Program crash
PID:1208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 17203⤵
- Program crash
PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 17003⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 11083⤵
- Program crash
PID:812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2876 -ip 28761⤵PID:3092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3880 -ip 38801⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3880 -ip 38801⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3880 -ip 38801⤵PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3880 -ip 38801⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3880 -ip 38801⤵PID:1064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3880 -ip 38801⤵PID:2500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3880 -ip 38801⤵PID:3540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3880 -ip 38801⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3880 -ip 38801⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3880 -ip 38801⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3880 -ip 38801⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3880 -ip 38801⤵PID:3200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4c61ae09285cbd2e59772af9b8124ef611c5a3ea87f36e5a7a1f2b380c0cf474.exe
Filesize2.1MB
MD5800295b92b8f6449b5da6876d0b204b6
SHA1a7120b92be6c821e6327220ca0f72820b4abe277
SHA2567c7a01c47ebc721d61806c9d5d04492617ba225eaca1edfbfbc72742bb67b1a1
SHA51241dd3f8c7d72b90d2a54060cf1fb831d1e92595f34721d78249a7886f30795b435dcf4bbf9f8ea3db300743ce6b1ec45fa70c6055541c191dff8abaa7eba961a