Analysis
-
max time kernel
4s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 22:20
Behavioral task
behavioral1
Sample
057675eef0c78a4f47eff70d248b2cda.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
057675eef0c78a4f47eff70d248b2cda.exe
Resource
win10v2004-20231222-en
General
-
Target
057675eef0c78a4f47eff70d248b2cda.exe
-
Size
3.9MB
-
MD5
057675eef0c78a4f47eff70d248b2cda
-
SHA1
54c80ff06015457d8a233eee544823c5eb74978a
-
SHA256
0d0751833ea29483cfc49a5a1234d93869bc6981eab924afaf5b0c91314c5741
-
SHA512
87d12475253445ca783b9206aff521b1e65d6e9fb664331190ca5d7b9283627ca71e8f09124f0f915dcc654c3d1db375bd8299044ce50a6da22f5ed4782a8e35
-
SSDEEP
98304:ElzvVRBKgqmW5FcA9zyULG+YFin9PAr+LzKA9zyULG+0Y7+Wp303yA9zyULG+YF4:evV6gDkzLqUhArmPzLqJYrGzzLqUhArp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5664 057675eef0c78a4f47eff70d248b2cda.exe -
Executes dropped EXE 1 IoCs
pid Process 5664 057675eef0c78a4f47eff70d248b2cda.exe -
resource yara_rule behavioral2/memory/5244-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/files/0x000700000002320f-12.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 18 IoCs
pid pid_target Process procid_target 1436 5664 WerFault.exe 6076 5664 WerFault.exe 31 2744 5664 WerFault.exe 31 6000 5664 WerFault.exe 31 4848 5664 WerFault.exe 31 4108 5664 WerFault.exe 31 804 5664 WerFault.exe 31 2164 5664 WerFault.exe 31 4172 5664 WerFault.exe 31 3096 5664 WerFault.exe 31 2232 5664 WerFault.exe 31 5580 5664 WerFault.exe 31 5324 5664 WerFault.exe 31 2984 5664 WerFault.exe 31 3700 5664 WerFault.exe 31 448 5664 WerFault.exe 31 64 5664 WerFault.exe 31 4760 5664 WerFault.exe 31 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4744 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5244 057675eef0c78a4f47eff70d248b2cda.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5244 057675eef0c78a4f47eff70d248b2cda.exe 5664 057675eef0c78a4f47eff70d248b2cda.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5244 wrote to memory of 5664 5244 057675eef0c78a4f47eff70d248b2cda.exe 31 PID 5244 wrote to memory of 5664 5244 057675eef0c78a4f47eff70d248b2cda.exe 31 PID 5244 wrote to memory of 5664 5244 057675eef0c78a4f47eff70d248b2cda.exe 31 PID 5664 wrote to memory of 4744 5664 057675eef0c78a4f47eff70d248b2cda.exe 21 PID 5664 wrote to memory of 4744 5664 057675eef0c78a4f47eff70d248b2cda.exe 21 PID 5664 wrote to memory of 4744 5664 057675eef0c78a4f47eff70d248b2cda.exe 21 PID 5664 wrote to memory of 2208 5664 057675eef0c78a4f47eff70d248b2cda.exe 29 PID 5664 wrote to memory of 2208 5664 057675eef0c78a4f47eff70d248b2cda.exe 29 PID 5664 wrote to memory of 2208 5664 057675eef0c78a4f47eff70d248b2cda.exe 29 PID 2208 wrote to memory of 4424 2208 cmd.exe 24 PID 2208 wrote to memory of 4424 2208 cmd.exe 24 PID 2208 wrote to memory of 4424 2208 cmd.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\057675eef0c78a4f47eff70d248b2cda.exe"C:\Users\Admin\AppData\Local\Temp\057675eef0c78a4f47eff70d248b2cda.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5244 -
C:\Users\Admin\AppData\Local\Temp\057675eef0c78a4f47eff70d248b2cda.exeC:\Users\Admin\AppData\Local\Temp\057675eef0c78a4f47eff70d248b2cda.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 6483⤵
- Program crash
PID:6076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 6563⤵
- Program crash
PID:2744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 7323⤵
- Program crash
PID:6000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 7403⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 7363⤵
- Program crash
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 14603⤵
- Program crash
PID:804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 19123⤵
- Program crash
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 21443⤵
- Program crash
PID:4172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 20963⤵
- Program crash
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 19283⤵
- Program crash
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 19803⤵
- Program crash
PID:5580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 21283⤵
- Program crash
PID:5324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 19843⤵
- Program crash
PID:2984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 22603⤵
- Program crash
PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 19923⤵
- Program crash
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 21323⤵
- Program crash
PID:64
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 6603⤵
- Program crash
PID:4760
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\057675eef0c78a4f47eff70d248b2cda.exe" /TN 0Su7L8S745c1 /F1⤵
- Creates scheduled task(s)
PID:4744
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 0Su7L8S745c11⤵PID:4424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5664 -ip 56641⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 6081⤵
- Program crash
PID:1436
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 0Su7L8S745c1 > C:\Users\Admin\AppData\Local\Temp\qmLgr.xml1⤵
- Suspicious use of WriteProcessMemory
PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5664 -ip 56641⤵PID:4124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5664 -ip 56641⤵PID:2680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5664 -ip 56641⤵PID:4700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5664 -ip 56641⤵PID:5272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5664 -ip 56641⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5664 -ip 56641⤵PID:2448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 5664 -ip 56641⤵PID:928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5664 -ip 56641⤵PID:5172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5664 -ip 56641⤵PID:6020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5664 -ip 56641⤵PID:628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5664 -ip 56641⤵PID:5352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 5664 -ip 56641⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 5664 -ip 56641⤵PID:4660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 5664 -ip 56641⤵PID:2036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 5664 -ip 56641⤵PID:5496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 5664 -ip 56641⤵PID:5628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5664 -ip 56641⤵PID:1708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD51b431c6b749896c98b68f94d329ecda7
SHA1ff5ff6563c13a0b55df672d6d3b4cee614fd7429
SHA256c9052669a19de9f85536824f9476b3d37c27955fde83cda4b6efca1d74a7655a
SHA512ddcf4a1655b7ec92616b589c7192c502a45221b4470f3578376f87ea59d4c6ab69fac8c353a61f4b67fd5e5ac49bad96544995fdf9a3deaed009ef1a1f3e74b4
-
Filesize
1KB
MD5167014813e557dc006c5b2970ece9e9b
SHA14cd5ad3c9b6ddf28b346a7dc1faedc0199af615c
SHA256e896240fb13b570dfd7be8f0d04067f8021a35a7d2ab9545859c7e6b7c7c2bba
SHA5120e5a757d3e8fd1536fec26bb1f0ccdddaaafb20a35c5d6d1f1f0daa6dc36ba01eb0b8857cc2e7b44ddb9fbfcd79416d4a9f9a6bb5285c9b871a1fa43743b835c