Analysis

  • max time kernel
    138s
  • max time network
    152s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23/12/2023, 13:42

General

  • Target

    FantaUD.exe

  • Size

    6.2MB

  • MD5

    a3f60cf65f209f17ba1630c6aef48d6b

  • SHA1

    6ccd6fab394659e68ccdc4143645958af7a258ab

  • SHA256

    7a6cbf83e9314f737085966c78d7dab8c1bfc067fe55d35c4d33e4cd0b39f3e4

  • SHA512

    969f05da9a2131aecc0a70014f9c7fcca946df93cad9c650898842bed80b70a699a780469a7eb999a6bb84ce64e1b73187a1e03f9671a99f293ed4f7b117efdb

  • SSDEEP

    196608:pJrhrwP8JHut+KQUgdT/u6hYnQUToloFaw+:pJrRJHut/QUgp/uyU7j

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FantaUD.exe
    "C:\Users\Admin\AppData\Local\Temp\FantaUD.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\Temp\SOLUTION.EXE
      "C:\Users\Admin\AppData\Local\Temp\SOLUTION.EXE"
      2⤵
      • Executes dropped EXE
      PID:4076
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 864
      2⤵
      • Program crash
      PID:3652
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1976 -ip 1976
    1⤵
      PID:3556

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\SOLUTION.EXE

            Filesize

            519KB

            MD5

            e226e3451f34e5c86837bc08f3733a35

            SHA1

            a745bba5ff6bb093056954ed720289dc257a57f9

            SHA256

            8fb2681dc379493786be8d2191c7d9b06c50995d81de0f6d80767a239e003edb

            SHA512

            fa57d8541c6856eee8faaf475ab54adb969013d88515705668e4567df6d2182fdffa45dbc5212c11b52e13b74d4aaaddf3c7605378d3cc959589cca51dec7738

          • memory/1976-7-0x0000000003BC0000-0x0000000003BC1000-memory.dmp

            Filesize

            4KB

          • memory/1976-1-0x0000000003B40000-0x0000000003B41000-memory.dmp

            Filesize

            4KB

          • memory/1976-4-0x0000000000DA0000-0x0000000001802000-memory.dmp

            Filesize

            10.4MB

          • memory/1976-5-0x0000000003B90000-0x0000000003B91000-memory.dmp

            Filesize

            4KB

          • memory/1976-3-0x0000000003B80000-0x0000000003B81000-memory.dmp

            Filesize

            4KB

          • memory/1976-0-0x0000000000DA0000-0x0000000001802000-memory.dmp

            Filesize

            10.4MB

          • memory/1976-6-0x0000000003BB0000-0x0000000003BB1000-memory.dmp

            Filesize

            4KB

          • memory/1976-8-0x0000000003BD0000-0x0000000003BD1000-memory.dmp

            Filesize

            4KB

          • memory/1976-9-0x0000000003BE0000-0x0000000003BE1000-memory.dmp

            Filesize

            4KB

          • memory/1976-10-0x0000000000DA0000-0x0000000001802000-memory.dmp

            Filesize

            10.4MB

          • memory/1976-2-0x0000000003B50000-0x0000000003B51000-memory.dmp

            Filesize

            4KB

          • memory/1976-20-0x0000000000DA0000-0x0000000001802000-memory.dmp

            Filesize

            10.4MB