Analysis
-
max time kernel
134s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exe
Resource
win10v2004-20231023-en
General
-
Target
a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exe
-
Size
4.0MB
-
MD5
a36419c388ee0297b88226ad1bb9eaa1
-
SHA1
158ba0f3f35f50f8d45be5e128a19ce472942f85
-
SHA256
a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae
-
SHA512
e0b330fdcd146f176e7bffb42cb96e635267fded3b07e9f5f28e7934bf8326c7647920c910cf0b62ccc7d28e484eab10a3d6bfa10df5d15bd22409363bc66fdb
-
SSDEEP
49152:3RMOyk5TpnskRAi+1ghbq4TTow+lsghbyV8qXdTt/P9afxiMghbq4TTow+lsghbD:Jp92chTWROV8qtx9aYhTWRH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 732 a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exe -
Executes dropped EXE 1 IoCs
pid Process 732 a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 13 IoCs
pid pid_target Process procid_target 4048 4208 WerFault.exe 87 4916 732 WerFault.exe 96 3548 732 WerFault.exe 96 1920 732 WerFault.exe 96 4084 732 WerFault.exe 96 3112 732 WerFault.exe 96 4268 732 WerFault.exe 96 4700 732 WerFault.exe 96 1192 732 WerFault.exe 96 440 732 WerFault.exe 96 3136 732 WerFault.exe 96 3208 732 WerFault.exe 96 5040 732 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 732 a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exe 732 a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4208 a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 732 a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4208 wrote to memory of 732 4208 a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exe 96 PID 4208 wrote to memory of 732 4208 a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exe 96 PID 4208 wrote to memory of 732 4208 a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exe"C:\Users\Admin\AppData\Local\Temp\a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 3442⤵
- Program crash
PID:4048
-
-
C:\Users\Admin\AppData\Local\Temp\a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exeC:\Users\Admin\AppData\Local\Temp\a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 3443⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 6363⤵
- Program crash
PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 6643⤵
- Program crash
PID:1920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 6563⤵
- Program crash
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 7203⤵
- Program crash
PID:3112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 9203⤵
- Program crash
PID:4268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 14043⤵
- Program crash
PID:4700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 14643⤵
- Program crash
PID:1192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 16563⤵
- Program crash
PID:440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 14763⤵
- Program crash
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 15123⤵
- Program crash
PID:3208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 15083⤵
- Program crash
PID:5040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4208 -ip 42081⤵PID:3008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 732 -ip 7321⤵PID:464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 732 -ip 7321⤵PID:1192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 732 -ip 7321⤵PID:5052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 732 -ip 7321⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 732 -ip 7321⤵PID:3596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 732 -ip 7321⤵PID:4228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 732 -ip 7321⤵PID:1652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 732 -ip 7321⤵PID:5056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 732 -ip 7321⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 732 -ip 7321⤵PID:448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 732 -ip 7321⤵PID:1632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 732 -ip 7321⤵PID:2424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\a02879c2ed78b8079b85ae4fc1ed2cd3198f1e9f8d83b864f7734c67f3feedae.exe
Filesize4.0MB
MD55ac393e086dc2096fcb3f96dea0dd69a
SHA1522be858ec0b21f19b0e9529f568c36f2f0b4cb6
SHA256899928c7d2a681e9a605754c1d2f5d84c3e944ef5363747cf57515e9df3d8c1b
SHA512ca9708df197c3b40d4551a2c39ba02b40194656f6e96fb7f1ed5f7ff429d0c9da6d9cc9727cedda9aaf5767f017d85b72c31010911a5de78bd6c57d481c81232