Analysis

  • max time kernel
    135s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20231220-en
  • resource tags

    arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/12/2023, 00:44

General

  • Target

    FantaUD.exe

  • Size

    6.2MB

  • MD5

    a3f60cf65f209f17ba1630c6aef48d6b

  • SHA1

    6ccd6fab394659e68ccdc4143645958af7a258ab

  • SHA256

    7a6cbf83e9314f737085966c78d7dab8c1bfc067fe55d35c4d33e4cd0b39f3e4

  • SHA512

    969f05da9a2131aecc0a70014f9c7fcca946df93cad9c650898842bed80b70a699a780469a7eb999a6bb84ce64e1b73187a1e03f9671a99f293ed4f7b117efdb

  • SSDEEP

    196608:pJrhrwP8JHut+KQUgdT/u6hYnQUToloFaw+:pJrRJHut/QUgp/uyU7j

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FantaUD.exe
    "C:\Users\Admin\AppData\Local\Temp\FantaUD.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:96
    • C:\Users\Admin\AppData\Local\Temp\SOLUTION.EXE
      "C:\Users\Admin\AppData\Local\Temp\SOLUTION.EXE"
      2⤵
      • Executes dropped EXE
      PID:3668
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 96 -s 1096
      2⤵
      • Program crash
      PID:5116

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\SOLUTION.EXE

          Filesize

          519KB

          MD5

          e226e3451f34e5c86837bc08f3733a35

          SHA1

          a745bba5ff6bb093056954ed720289dc257a57f9

          SHA256

          8fb2681dc379493786be8d2191c7d9b06c50995d81de0f6d80767a239e003edb

          SHA512

          fa57d8541c6856eee8faaf475ab54adb969013d88515705668e4567df6d2182fdffa45dbc5212c11b52e13b74d4aaaddf3c7605378d3cc959589cca51dec7738

        • memory/96-0-0x0000000000320000-0x0000000000D82000-memory.dmp

          Filesize

          10.4MB

        • memory/96-2-0x00000000012F0000-0x00000000012F1000-memory.dmp

          Filesize

          4KB

        • memory/96-1-0x00000000012E0000-0x00000000012E1000-memory.dmp

          Filesize

          4KB

        • memory/96-3-0x0000000002EC0000-0x0000000002EC1000-memory.dmp

          Filesize

          4KB

        • memory/96-7-0x0000000002EF0000-0x0000000002EF1000-memory.dmp

          Filesize

          4KB

        • memory/96-6-0x0000000002EE0000-0x0000000002EE1000-memory.dmp

          Filesize

          4KB

        • memory/96-5-0x0000000000320000-0x0000000000D82000-memory.dmp

          Filesize

          10.4MB

        • memory/96-9-0x0000000002F10000-0x0000000002F11000-memory.dmp

          Filesize

          4KB

        • memory/96-8-0x0000000002F00000-0x0000000002F01000-memory.dmp

          Filesize

          4KB

        • memory/96-4-0x0000000002ED0000-0x0000000002ED1000-memory.dmp

          Filesize

          4KB

        • memory/96-17-0x0000000000320000-0x0000000000D82000-memory.dmp

          Filesize

          10.4MB