Analysis Overview
SHA256
7a6cbf83e9314f737085966c78d7dab8c1bfc067fe55d35c4d33e4cd0b39f3e4
Threat Level: Shows suspicious behavior
The file FantaUD.exe was found to be: Shows suspicious behavior.
Malicious Activity Summary
VMProtect packed file
Executes dropped EXE
Suspicious use of NtSetInformationThreadHideFromDebugger
Enumerates physical storage devices
Program crash
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-12-23 13:42
Signatures
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-12-23 13:42
Reported
2023-12-23 13:46
Platform
win11-20231215-en
Max time kernel
138s
Max time network
152s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\SOLUTION.EXE | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\FantaUD.exe | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\FantaUD.exe |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\FantaUD.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\FantaUD.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\FantaUD.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\FantaUD.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1976 wrote to memory of 4076 | N/A | C:\Users\Admin\AppData\Local\Temp\FantaUD.exe | C:\Users\Admin\AppData\Local\Temp\SOLUTION.EXE |
| PID 1976 wrote to memory of 4076 | N/A | C:\Users\Admin\AppData\Local\Temp\FantaUD.exe | C:\Users\Admin\AppData\Local\Temp\SOLUTION.EXE |
Processes
C:\Users\Admin\AppData\Local\Temp\FantaUD.exe
"C:\Users\Admin\AppData\Local\Temp\FantaUD.exe"
C:\Users\Admin\AppData\Local\Temp\SOLUTION.EXE
"C:\Users\Admin\AppData\Local\Temp\SOLUTION.EXE"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1976 -ip 1976
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 864
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
Files
memory/1976-0-0x0000000000DA0000-0x0000000001802000-memory.dmp
memory/1976-2-0x0000000003B50000-0x0000000003B51000-memory.dmp
memory/1976-1-0x0000000003B40000-0x0000000003B41000-memory.dmp
memory/1976-4-0x0000000000DA0000-0x0000000001802000-memory.dmp
memory/1976-5-0x0000000003B90000-0x0000000003B91000-memory.dmp
memory/1976-3-0x0000000003B80000-0x0000000003B81000-memory.dmp
memory/1976-7-0x0000000003BC0000-0x0000000003BC1000-memory.dmp
memory/1976-6-0x0000000003BB0000-0x0000000003BB1000-memory.dmp
memory/1976-8-0x0000000003BD0000-0x0000000003BD1000-memory.dmp
memory/1976-9-0x0000000003BE0000-0x0000000003BE1000-memory.dmp
memory/1976-10-0x0000000000DA0000-0x0000000001802000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\SOLUTION.EXE
| MD5 | e226e3451f34e5c86837bc08f3733a35 |
| SHA1 | a745bba5ff6bb093056954ed720289dc257a57f9 |
| SHA256 | 8fb2681dc379493786be8d2191c7d9b06c50995d81de0f6d80767a239e003edb |
| SHA512 | fa57d8541c6856eee8faaf475ab54adb969013d88515705668e4567df6d2182fdffa45dbc5212c11b52e13b74d4aaaddf3c7605378d3cc959589cca51dec7738 |
memory/1976-20-0x0000000000DA0000-0x0000000001802000-memory.dmp