Analysis
-
max time kernel
137s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exe
Resource
win10v2004-20231023-en
General
-
Target
1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exe
-
Size
1.1MB
-
MD5
4ab3eef9c90334679506f90095f2f4f4
-
SHA1
3d8722a74f2178513f84464bcdb32ebf1090d69f
-
SHA256
1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce
-
SHA512
af13f921327e5a06ed50d4ad21b7c627613a5c885cf60bfbf198421fc56a0a303b2c2fcd1fef8068908b24f758e9f8be8c9f5517a53dfd4f3476628417711be3
-
SSDEEP
24576:U08OZQ5CZCoCACSu/d3IAmkC1x4z480fNI:U0NZhWd3IlXO48KK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4084 1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exe -
Executes dropped EXE 1 IoCs
pid Process 4084 1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 13 IoCs
pid pid_target Process procid_target 2148 416 WerFault.exe 83 632 4084 WerFault.exe 91 4548 4084 WerFault.exe 91 5024 4084 WerFault.exe 91 4872 4084 WerFault.exe 91 4656 4084 WerFault.exe 91 688 4084 WerFault.exe 91 5076 4084 WerFault.exe 91 2168 4084 WerFault.exe 91 3960 4084 WerFault.exe 91 3912 4084 WerFault.exe 91 3028 4084 WerFault.exe 91 4828 4084 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4084 1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exe 4084 1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 416 1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4084 1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 416 wrote to memory of 4084 416 1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exe 91 PID 416 wrote to memory of 4084 416 1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exe 91 PID 416 wrote to memory of 4084 416 1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exe"C:\Users\Admin\AppData\Local\Temp\1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 416 -s 3522⤵
- Program crash
PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exeC:\Users\Admin\AppData\Local\Temp\1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:4084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 3443⤵
- Program crash
PID:632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 6283⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 6363⤵
- Program crash
PID:5024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 6603⤵
- Program crash
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 7203⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 9283⤵
- Program crash
PID:688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 13923⤵
- Program crash
PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 14683⤵
- Program crash
PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 14363⤵
- Program crash
PID:3960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 14483⤵
- Program crash
PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 15123⤵
- Program crash
PID:3028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 6523⤵
- Program crash
PID:4828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 416 -ip 4161⤵PID:2088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4084 -ip 40841⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4084 -ip 40841⤵PID:2084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4084 -ip 40841⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4084 -ip 40841⤵PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4084 -ip 40841⤵PID:4928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4084 -ip 40841⤵PID:3096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4084 -ip 40841⤵PID:3452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4084 -ip 40841⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4084 -ip 40841⤵PID:1076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4084 -ip 40841⤵PID:2368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4084 -ip 40841⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4084 -ip 40841⤵PID:3144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1e69035da18110b6e083498ed1899baa5dda686b86a73a28816c3c68d722a1ce.exe
Filesize1.1MB
MD50ad1cb3d82aa4bce677ceeb79ede57ad
SHA157eb54b702cea00f4ce4e74848be520ce02cbca5
SHA2561e21bc6a2cccbc65537c9825f1562b3023839358565149e42580287bd966cddf
SHA51255a8b24a5de70232573c8dec386b0146fd510d83ad008ddadf1db795672ffff31e700ee2f11cfbf76568b717de41561e70824c06f889806d0f93275df3b535a1