Analysis
-
max time kernel
2s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 23:33
Behavioral task
behavioral1
Sample
2025b9e26267efead64f719a14f37633.exe
Resource
win7-20231215-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
2025b9e26267efead64f719a14f37633.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
2025b9e26267efead64f719a14f37633.exe
-
Size
2.0MB
-
MD5
2025b9e26267efead64f719a14f37633
-
SHA1
b7f117b1fd51f8fdd74c62a4b5e9c2f1537795f9
-
SHA256
c6b00db4ce342ff378bd8c1ccd7acb607246d334d645bdaa64887407d1094d4c
-
SHA512
76ec3d7b2704326bdfe44333307cc693f95de84898672b6704532f0d5fd26f7169510dc9df39799d4d36d20f8d1d4298a2cf919f0acc9d309d527c53f25b6cd0
-
SSDEEP
49152:eXK1ZbPTNuum+cN+9zWFULG+0dKS24DpVUcN+9zWFULG+:9zduumnA9zyULG+0dKz4DpvA9zyULG+
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 640 2025b9e26267efead64f719a14f37633.exe -
Executes dropped EXE 1 IoCs
pid Process 640 2025b9e26267efead64f719a14f37633.exe -
resource yara_rule behavioral2/memory/4004-0-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 20 IoCs
pid pid_target Process procid_target 3168 640 WerFault.exe 1444 640 WerFault.exe 456 640 WerFault.exe 2044 640 WerFault.exe 30 3628 640 WerFault.exe 30 5096 640 WerFault.exe 30 4632 640 WerFault.exe 30 3524 640 WerFault.exe 30 4960 640 WerFault.exe 30 2768 640 WerFault.exe 30 4352 640 WerFault.exe 30 2900 640 WerFault.exe 30 208 640 WerFault.exe 30 1688 640 WerFault.exe 30 4192 640 WerFault.exe 30 5084 640 WerFault.exe 30 3736 640 WerFault.exe 30 5008 640 WerFault.exe 30 904 640 WerFault.exe 30 1596 640 WerFault.exe 30 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1784 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4004 2025b9e26267efead64f719a14f37633.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4004 2025b9e26267efead64f719a14f37633.exe 640 2025b9e26267efead64f719a14f37633.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4004 wrote to memory of 640 4004 2025b9e26267efead64f719a14f37633.exe 30 PID 4004 wrote to memory of 640 4004 2025b9e26267efead64f719a14f37633.exe 30 PID 4004 wrote to memory of 640 4004 2025b9e26267efead64f719a14f37633.exe 30 PID 640 wrote to memory of 1784 640 2025b9e26267efead64f719a14f37633.exe 16 PID 640 wrote to memory of 1784 640 2025b9e26267efead64f719a14f37633.exe 16 PID 640 wrote to memory of 1784 640 2025b9e26267efead64f719a14f37633.exe 16 PID 640 wrote to memory of 2408 640 2025b9e26267efead64f719a14f37633.exe 24 PID 640 wrote to memory of 2408 640 2025b9e26267efead64f719a14f37633.exe 24 PID 640 wrote to memory of 2408 640 2025b9e26267efead64f719a14f37633.exe 24 PID 2408 wrote to memory of 3048 2408 cmd.exe 17 PID 2408 wrote to memory of 3048 2408 cmd.exe 17 PID 2408 wrote to memory of 3048 2408 cmd.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025b9e26267efead64f719a14f37633.exe"C:\Users\Admin\AppData\Local\Temp\2025b9e26267efead64f719a14f37633.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\2025b9e26267efead64f719a14f37633.exeC:\Users\Admin\AppData\Local\Temp\2025b9e26267efead64f719a14f37633.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 6443⤵
- Program crash
PID:2044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 7363⤵
- Program crash
PID:3628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 7803⤵
- Program crash
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 14603⤵
- Program crash
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 18643⤵
- Program crash
PID:3524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 21283⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 19123⤵
- Program crash
PID:2768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 21283⤵
- Program crash
PID:4352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 18643⤵
- Program crash
PID:2900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 19723⤵
- Program crash
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 21803⤵
- Program crash
PID:1688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 21283⤵
- Program crash
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 21883⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 21323⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 21763⤵
- Program crash
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 19403⤵
- Program crash
PID:904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 6363⤵
- Program crash
PID:1596
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\2025b9e26267efead64f719a14f37633.exe" /TN nMQUF5AE494a /F1⤵
- Creates scheduled task(s)
PID:1784
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN nMQUF5AE494a1⤵PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 640 -ip 6401⤵PID:724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 6121⤵
- Program crash
PID:3168
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN nMQUF5AE494a > C:\Users\Admin\AppData\Local\Temp\nEc4QWO.xml1⤵
- Suspicious use of WriteProcessMemory
PID:2408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 640 -ip 6401⤵PID:1624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 6401⤵
- Program crash
PID:1444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 640 -ip 6401⤵PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 6241⤵
- Program crash
PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 640 -ip 6401⤵PID:912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 640 -ip 6401⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 640 -ip 6401⤵PID:2660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 640 -ip 6401⤵PID:4780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 640 -ip 6401⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 640 -ip 6401⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 640 -ip 6401⤵PID:1656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 640 -ip 6401⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 640 -ip 6401⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 640 -ip 6401⤵PID:2980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 640 -ip 6401⤵PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 640 -ip 6401⤵PID:3772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 640 -ip 6401⤵PID:1828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 640 -ip 6401⤵PID:448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 640 -ip 6401⤵PID:4928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 640 -ip 6401⤵PID:3640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 640 -ip 6401⤵PID:2088