Analysis
-
max time kernel
3s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 14:43
Behavioral task
behavioral1
Sample
c940abd49dd66ca56a2e730559693402.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c940abd49dd66ca56a2e730559693402.exe
Resource
win10v2004-20231215-en
General
-
Target
c940abd49dd66ca56a2e730559693402.exe
-
Size
1003KB
-
MD5
c940abd49dd66ca56a2e730559693402
-
SHA1
ef485356936ed0693522ae5c9538c39fed789fc6
-
SHA256
383ebd9a31e3f1874901c32fbfb2310bce1d2e3d924f2b238e145ac9da608ff8
-
SHA512
52e012484fc835f0112475ec4295a0faa1faf4198f16fb4b145f5c6446d84d108e90d3c595cc80808ec9f3c233829ac10dac2b2fde2663605e02dfa408e9733f
-
SSDEEP
24576:m+3Edqfw8Rqzj9GeVuLLwNa0erkZdEx3Knx6Y6:m+3EdqI8R2j9GeVCLwNBerkZdEx3Kns
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1988 c940abd49dd66ca56a2e730559693402.exe -
Executes dropped EXE 1 IoCs
pid Process 1988 c940abd49dd66ca56a2e730559693402.exe -
resource yara_rule behavioral2/memory/4100-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/files/0x000700000002320d-13.dat upx behavioral2/memory/1988-14-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 17 IoCs
pid pid_target Process procid_target 3092 1988 WerFault.exe 88 1568 1988 WerFault.exe 88 2064 1988 WerFault.exe 88 5116 1988 WerFault.exe 88 2224 1988 WerFault.exe 88 1632 1988 WerFault.exe 88 4052 1988 WerFault.exe 88 516 1988 WerFault.exe 88 4808 1988 WerFault.exe 88 4204 1988 WerFault.exe 88 3992 1988 WerFault.exe 88 4080 1988 WerFault.exe 88 4348 1988 WerFault.exe 88 4912 1988 WerFault.exe 88 4356 1988 WerFault.exe 88 2772 1988 WerFault.exe 88 4312 1988 WerFault.exe 88 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3424 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4100 c940abd49dd66ca56a2e730559693402.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4100 c940abd49dd66ca56a2e730559693402.exe 1988 c940abd49dd66ca56a2e730559693402.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4100 wrote to memory of 1988 4100 c940abd49dd66ca56a2e730559693402.exe 88 PID 4100 wrote to memory of 1988 4100 c940abd49dd66ca56a2e730559693402.exe 88 PID 4100 wrote to memory of 1988 4100 c940abd49dd66ca56a2e730559693402.exe 88 PID 1988 wrote to memory of 3424 1988 c940abd49dd66ca56a2e730559693402.exe 91 PID 1988 wrote to memory of 3424 1988 c940abd49dd66ca56a2e730559693402.exe 91 PID 1988 wrote to memory of 3424 1988 c940abd49dd66ca56a2e730559693402.exe 91 PID 1988 wrote to memory of 5040 1988 c940abd49dd66ca56a2e730559693402.exe 98 PID 1988 wrote to memory of 5040 1988 c940abd49dd66ca56a2e730559693402.exe 98 PID 1988 wrote to memory of 5040 1988 c940abd49dd66ca56a2e730559693402.exe 98 PID 5040 wrote to memory of 4652 5040 cmd.exe 93 PID 5040 wrote to memory of 4652 5040 cmd.exe 93 PID 5040 wrote to memory of 4652 5040 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c940abd49dd66ca56a2e730559693402.exe"C:\Users\Admin\AppData\Local\Temp\c940abd49dd66ca56a2e730559693402.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\c940abd49dd66ca56a2e730559693402.exeC:\Users\Admin\AppData\Local\Temp\c940abd49dd66ca56a2e730559693402.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c940abd49dd66ca56a2e730559693402.exe" /TN 1WOV8tOcae1c /F3⤵
- Creates scheduled task(s)
PID:3424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 6163⤵
- Program crash
PID:3092
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 1WOV8tOcae1c > C:\Users\Admin\AppData\Local\Temp\dPazfY.xml3⤵
- Suspicious use of WriteProcessMemory
PID:5040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 6523⤵
- Program crash
PID:1568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 6603⤵
- Program crash
PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 7243⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 7243⤵
- Program crash
PID:2224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 7843⤵
- Program crash
PID:1632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 14643⤵
- Program crash
PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 19203⤵
- Program crash
PID:516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 21443⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 19323⤵
- Program crash
PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 19443⤵
- Program crash
PID:3992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 19203⤵
- Program crash
PID:4080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 22563⤵
- Program crash
PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 21083⤵
- Program crash
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 22523⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 19243⤵
- Program crash
PID:2772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 6483⤵
- Program crash
PID:4312
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 1WOV8tOcae1c1⤵PID:4652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1988 -ip 19881⤵PID:2476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1988 -ip 19881⤵PID:3256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1988 -ip 19881⤵PID:3904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1988 -ip 19881⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1988 -ip 19881⤵PID:2116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1988 -ip 19881⤵PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1988 -ip 19881⤵PID:2872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1988 -ip 19881⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1988 -ip 19881⤵PID:3616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1988 -ip 19881⤵PID:2400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1988 -ip 19881⤵PID:3568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1988 -ip 19881⤵PID:4952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1988 -ip 19881⤵PID:1928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1988 -ip 19881⤵PID:2500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1988 -ip 19881⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1988 -ip 19881⤵PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1988 -ip 19881⤵PID:3764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD50c9a1cfaea556070cab99437234e3edd
SHA1882dbcc2d69f3d4f8035acfb56b1b1a95866df2c
SHA25692cc789dcb4a3e0bda0438150578a8cf6a07117bcd07a1c9ca108a30d30ea1a3
SHA51230e8f6787e141bc64b3191a7449bbcc359e3aa0c7766721c6f2ccab87c4b404b6b770a1d86b9dd92615d875fd61e5e922922f78f388c96b0793a0ddd7d5735ea
-
Filesize
1KB
MD58f61a1c296a6355067c23274bdac7f97
SHA1cf3880c5936aebe57589202a48afcddec3176bd8
SHA256f799a89e380087fee45e06ab2173d62ca4840a20f2a92ad8f4723660d7dc6abe
SHA5120ca7b3581d400ce10b4ba2d7617756d0a805b4aa1632410ddfcd243fa6f50c1da1267aabe64e4aedb1952d05475f32fc1033b2477293fab4fed2430a9e107808