Analysis
-
max time kernel
4s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 10:06
Behavioral task
behavioral1
Sample
155a830c8edeb2b9c0676104ab68bb8d.exe
Resource
win7-20231215-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
155a830c8edeb2b9c0676104ab68bb8d.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
155a830c8edeb2b9c0676104ab68bb8d.exe
-
Size
7.8MB
-
MD5
155a830c8edeb2b9c0676104ab68bb8d
-
SHA1
f179621d9dd9001a3da9a00684961c45015bb091
-
SHA256
02b3305333562da42a63344b303c698000e4fddf8f739fbc7d3bbc961c47d0e2
-
SHA512
50c32300b5504f37b0ad11c8538ba5ad11f6336a4bee8d2b17d1dfa53c622b4e66ae3755e87c78985eb3663548992e97eb8744222f7d20db5e938974e090f74c
-
SSDEEP
196608:EFd/AHdlirybMgOnkdlirPKOfeEdlirybMgOnkdlir68KiSdFddlirybMgOnkdlp:0+bMrnzC2bMrnWZlbMrnzC2bMrn
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1016 155a830c8edeb2b9c0676104ab68bb8d.exe -
Executes dropped EXE 1 IoCs
pid Process 1016 155a830c8edeb2b9c0676104ab68bb8d.exe -
resource yara_rule behavioral2/memory/1460-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/memory/1016-14-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 18 IoCs
pid pid_target Process procid_target 800 1016 WerFault.exe 540 1016 WerFault.exe 32 3612 1016 WerFault.exe 32 1556 1016 WerFault.exe 32 3256 1016 WerFault.exe 32 3012 1016 WerFault.exe 32 2160 1016 WerFault.exe 32 3252 1016 WerFault.exe 32 1872 1016 WerFault.exe 32 1696 1016 WerFault.exe 32 5036 1016 WerFault.exe 32 1732 1016 WerFault.exe 32 3344 1016 WerFault.exe 32 4444 1016 WerFault.exe 32 2164 1016 WerFault.exe 32 1896 1016 WerFault.exe 32 4380 1016 WerFault.exe 32 1648 1016 WerFault.exe 32 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5044 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1460 155a830c8edeb2b9c0676104ab68bb8d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1460 155a830c8edeb2b9c0676104ab68bb8d.exe 1016 155a830c8edeb2b9c0676104ab68bb8d.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1016 1460 155a830c8edeb2b9c0676104ab68bb8d.exe 32 PID 1460 wrote to memory of 1016 1460 155a830c8edeb2b9c0676104ab68bb8d.exe 32 PID 1460 wrote to memory of 1016 1460 155a830c8edeb2b9c0676104ab68bb8d.exe 32 PID 1016 wrote to memory of 5044 1016 155a830c8edeb2b9c0676104ab68bb8d.exe 24 PID 1016 wrote to memory of 5044 1016 155a830c8edeb2b9c0676104ab68bb8d.exe 24 PID 1016 wrote to memory of 5044 1016 155a830c8edeb2b9c0676104ab68bb8d.exe 24 PID 1016 wrote to memory of 4208 1016 155a830c8edeb2b9c0676104ab68bb8d.exe 25 PID 1016 wrote to memory of 4208 1016 155a830c8edeb2b9c0676104ab68bb8d.exe 25 PID 1016 wrote to memory of 4208 1016 155a830c8edeb2b9c0676104ab68bb8d.exe 25 PID 4208 wrote to memory of 2604 4208 cmd.exe 26 PID 4208 wrote to memory of 2604 4208 cmd.exe 26 PID 4208 wrote to memory of 2604 4208 cmd.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\155a830c8edeb2b9c0676104ab68bb8d.exe"C:\Users\Admin\AppData\Local\Temp\155a830c8edeb2b9c0676104ab68bb8d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\155a830c8edeb2b9c0676104ab68bb8d.exeC:\Users\Admin\AppData\Local\Temp\155a830c8edeb2b9c0676104ab68bb8d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 6323⤵
- Program crash
PID:540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 7083⤵
- Program crash
PID:3612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 6283⤵
- Program crash
PID:1556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 6283⤵
- Program crash
PID:3256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 7363⤵
- Program crash
PID:3012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 14243⤵
- Program crash
PID:2160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 19243⤵
- Program crash
PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 21443⤵
- Program crash
PID:1872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 21043⤵
- Program crash
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 19363⤵
- Program crash
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 19283⤵
- Program crash
PID:1732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 21083⤵
- Program crash
PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 21123⤵
- Program crash
PID:4444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 21923⤵
- Program crash
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 19483⤵
- Program crash
PID:1896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 18843⤵
- Program crash
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 7043⤵
- Program crash
PID:1648
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\155a830c8edeb2b9c0676104ab68bb8d.exe" /TN mCaqQXkK46ae /F1⤵
- Creates scheduled task(s)
PID:5044
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN mCaqQXkK46ae > C:\Users\Admin\AppData\Local\Temp\Pi7fX.xml1⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN mCaqQXkK46ae2⤵PID:2604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1016 -ip 10161⤵PID:3208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 6001⤵
- Program crash
PID:800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1016 -ip 10161⤵PID:4636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1016 -ip 10161⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1016 -ip 10161⤵PID:444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1016 -ip 10161⤵PID:2116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1016 -ip 10161⤵PID:852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1016 -ip 10161⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1016 -ip 10161⤵PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1016 -ip 10161⤵PID:3304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1016 -ip 10161⤵PID:4052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1016 -ip 10161⤵PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1016 -ip 10161⤵PID:4308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1016 -ip 10161⤵PID:1036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1016 -ip 10161⤵PID:3312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1016 -ip 10161⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1016 -ip 10161⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1016 -ip 10161⤵PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1016 -ip 10161⤵PID:5052