Analysis
-
max time kernel
150s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exe
Resource
win10v2004-20231023-en
General
-
Target
8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exe
-
Size
4.3MB
-
MD5
6470b0d01b2b1525dfaccb9071144639
-
SHA1
10fc19beb2d23f7fb13a9aacb007dac11c86d1cc
-
SHA256
8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0
-
SHA512
54f59b40ef2356881f760dd9884071c8b75a829d4d8433b198844fe85df6b492a56acf0c380addff8787decc716ecb15c14d982fb84a94ccc61ea71c5c9780d6
-
SSDEEP
98304:gZD0WoT7o0Fu1W8XED7DyRhT7o0Fu1W8XEm:g90WoT8ED7Dy7T8Em
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3408 8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exe -
Executes dropped EXE 1 IoCs
pid Process 3408 8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 11 IoCs
pid pid_target Process procid_target 1888 3408 WerFault.exe 93 1972 3408 WerFault.exe 93 4524 3408 WerFault.exe 93 2260 3408 WerFault.exe 93 4708 3408 WerFault.exe 93 4056 3408 WerFault.exe 93 2636 3408 WerFault.exe 93 2368 3408 WerFault.exe 93 1948 3408 WerFault.exe 93 4184 3408 WerFault.exe 93 4256 3408 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3408 8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exe 3408 8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1128 8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3408 8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1128 wrote to memory of 3408 1128 8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exe 93 PID 1128 wrote to memory of 3408 1128 8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exe 93 PID 1128 wrote to memory of 3408 1128 8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exe"C:\Users\Admin\AppData\Local\Temp\8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exeC:\Users\Admin\AppData\Local\Temp\8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:3408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 3443⤵
- Program crash
PID:1888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 6363⤵
- Program crash
PID:1972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 6363⤵
- Program crash
PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 6563⤵
- Program crash
PID:2260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 7203⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 8843⤵
- Program crash
PID:4056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 13403⤵
- Program crash
PID:2636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 14803⤵
- Program crash
PID:2368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 14683⤵
- Program crash
PID:1948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 14843⤵
- Program crash
PID:4184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 16763⤵
- Program crash
PID:4256
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1128 -ip 11281⤵PID:4468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3408 -ip 34081⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3408 -ip 34081⤵PID:1064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3408 -ip 34081⤵PID:2972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3408 -ip 34081⤵PID:3120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3408 -ip 34081⤵PID:4340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3408 -ip 34081⤵PID:2760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3408 -ip 34081⤵PID:1116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3408 -ip 34081⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3408 -ip 34081⤵PID:2244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3408 -ip 34081⤵PID:3776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3408 -ip 34081⤵PID:3916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8e4394a0e07fbe17d0e3a0b367e033bb7c3fb750814717acf6d8dcb3396401b0.exe
Filesize4.3MB
MD561b58bfdc63fc89ddc76bb18c5c0e658
SHA128354425cfce4414b2f6b9f2ab5ef349862ef49f
SHA2562f9393dd855d369d50ca40334ea652a18c8f081f5fd4074731371d8a11e9f44f
SHA512165690e7cc1b968797a7cee17d81bb591cda3fae849f91e97d13975efee9b080e70e28da31327167cff58b44a136e1f1882afad5a8a2075b940e0841ee40eeb4