Analysis
-
max time kernel
17s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 08:07
Behavioral task
behavioral1
Sample
1301bac0ed7f020e5044c7341e59f34f.exe
Resource
win7-20231129-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
1301bac0ed7f020e5044c7341e59f34f.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
1301bac0ed7f020e5044c7341e59f34f.exe
-
Size
2.0MB
-
MD5
1301bac0ed7f020e5044c7341e59f34f
-
SHA1
c560e6379a54f97bfa998d35768f4b1590e89911
-
SHA256
13e1ef5ece68a28800bc6fc7a7b0d66e49e678619a7957be489317d88418b54e
-
SHA512
3402b7896bc13435a9c47b2308c6fab11f7ac500a267c8483d39807974e338a24b4a638e5b880f986a2b0b18cac275a6d4b5e81f9b47d33f62793f29120d415d
-
SSDEEP
49152:69Sn4UwdOjIjAqW6OHESEIwkID1mhi9wYIjAqW6OH:69Sn4UwdOjIjAqWl1EIwkIBmhi6YIjAF
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3508 1301bac0ed7f020e5044c7341e59f34f.exe -
Executes dropped EXE 1 IoCs
pid Process 3508 1301bac0ed7f020e5044c7341e59f34f.exe -
resource yara_rule behavioral2/memory/4620-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/memory/3508-14-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 5 IoCs
pid pid_target Process procid_target 4988 3508 WerFault.exe 23 5028 3508 WerFault.exe 23 1172 3508 WerFault.exe 23 3732 3508 WerFault.exe 23 1344 3508 WerFault.exe 23 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1752 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4620 1301bac0ed7f020e5044c7341e59f34f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4620 1301bac0ed7f020e5044c7341e59f34f.exe 3508 1301bac0ed7f020e5044c7341e59f34f.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4620 wrote to memory of 3508 4620 1301bac0ed7f020e5044c7341e59f34f.exe 23 PID 4620 wrote to memory of 3508 4620 1301bac0ed7f020e5044c7341e59f34f.exe 23 PID 4620 wrote to memory of 3508 4620 1301bac0ed7f020e5044c7341e59f34f.exe 23 PID 3508 wrote to memory of 1752 3508 1301bac0ed7f020e5044c7341e59f34f.exe 24 PID 3508 wrote to memory of 1752 3508 1301bac0ed7f020e5044c7341e59f34f.exe 24 PID 3508 wrote to memory of 1752 3508 1301bac0ed7f020e5044c7341e59f34f.exe 24 PID 3508 wrote to memory of 4776 3508 1301bac0ed7f020e5044c7341e59f34f.exe 36 PID 3508 wrote to memory of 4776 3508 1301bac0ed7f020e5044c7341e59f34f.exe 36 PID 3508 wrote to memory of 4776 3508 1301bac0ed7f020e5044c7341e59f34f.exe 36 PID 4776 wrote to memory of 3832 4776 cmd.exe 33 PID 4776 wrote to memory of 3832 4776 cmd.exe 33 PID 4776 wrote to memory of 3832 4776 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1301bac0ed7f020e5044c7341e59f34f.exe"C:\Users\Admin\AppData\Local\Temp\1301bac0ed7f020e5044c7341e59f34f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\1301bac0ed7f020e5044c7341e59f34f.exeC:\Users\Admin\AppData\Local\Temp\1301bac0ed7f020e5044c7341e59f34f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\1301bac0ed7f020e5044c7341e59f34f.exe" /TN xWvB9PLxff3d /F3⤵
- Creates scheduled task(s)
PID:1752
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN xWvB9PLxff3d > C:\Users\Admin\AppData\Local\Temp\bS9wM7isW.xml3⤵
- Suspicious use of WriteProcessMemory
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 6003⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 6283⤵
- Program crash
PID:5028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 6363⤵
- Program crash
PID:1172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 7443⤵
- Program crash
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 7203⤵
- Program crash
PID:1344
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN xWvB9PLxff3d1⤵PID:3832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3508 -ip 35081⤵PID:3972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3508 -ip 35081⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3508 -ip 35081⤵PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3508 -ip 35081⤵PID:3976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3508 -ip 35081⤵PID:976