Analysis
-
max time kernel
4s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 07:24
Behavioral task
behavioral1
Sample
2d490655db189715b3550c32ae75742e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2d490655db189715b3550c32ae75742e.exe
Resource
win10v2004-20231215-en
General
-
Target
2d490655db189715b3550c32ae75742e.exe
-
Size
2.0MB
-
MD5
2d490655db189715b3550c32ae75742e
-
SHA1
52df90594e923d4a2e0cd8734d9b4d67bc3d1567
-
SHA256
9782fecd9d7aa03e8a0e7c4145e70d2cd8aaf61cfce519f0490d0359c0fc3c74
-
SHA512
b11053fa923ca724b0bede3455922e1f2f0bf3c3ec44065a8f8c58ee70ff0a5328a11150e6460251ee144df4a38127a2a18b9e94827ce9e9367a3943c15d113b
-
SSDEEP
49152:crYD1PBjKKuRK84Jj1FPGQ7ai7D3xTgOxYwpKOv2aeNi0rZ4qPmE2rKGQ7ai7D3g:croPBjKKu884JjXPD2i7D3xkOxYwpKOt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4064 2d490655db189715b3550c32ae75742e.exe -
Executes dropped EXE 1 IoCs
pid Process 4064 2d490655db189715b3550c32ae75742e.exe -
resource yara_rule behavioral2/memory/4908-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/memory/4064-14-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 18 IoCs
pid pid_target Process procid_target 5068 4064 WerFault.exe 3488 4064 WerFault.exe 948 4064 WerFault.exe 5028 4064 WerFault.exe 32 4884 4064 WerFault.exe 32 5052 4064 WerFault.exe 32 5076 4064 WerFault.exe 32 4360 4064 WerFault.exe 32 2324 4064 WerFault.exe 32 4328 4064 WerFault.exe 32 3712 4064 WerFault.exe 32 5000 4064 WerFault.exe 32 4996 4064 WerFault.exe 32 2228 4064 WerFault.exe 32 4412 4064 WerFault.exe 32 2344 4064 WerFault.exe 32 2308 4064 WerFault.exe 32 4556 4064 WerFault.exe 32 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5036 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4908 2d490655db189715b3550c32ae75742e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4908 2d490655db189715b3550c32ae75742e.exe 4064 2d490655db189715b3550c32ae75742e.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4908 wrote to memory of 4064 4908 2d490655db189715b3550c32ae75742e.exe 32 PID 4908 wrote to memory of 4064 4908 2d490655db189715b3550c32ae75742e.exe 32 PID 4908 wrote to memory of 4064 4908 2d490655db189715b3550c32ae75742e.exe 32 PID 4064 wrote to memory of 5036 4064 2d490655db189715b3550c32ae75742e.exe 26 PID 4064 wrote to memory of 5036 4064 2d490655db189715b3550c32ae75742e.exe 26 PID 4064 wrote to memory of 5036 4064 2d490655db189715b3550c32ae75742e.exe 26 PID 4064 wrote to memory of 736 4064 2d490655db189715b3550c32ae75742e.exe 24 PID 4064 wrote to memory of 736 4064 2d490655db189715b3550c32ae75742e.exe 24 PID 4064 wrote to memory of 736 4064 2d490655db189715b3550c32ae75742e.exe 24 PID 736 wrote to memory of 3004 736 cmd.exe 19 PID 736 wrote to memory of 3004 736 cmd.exe 19 PID 736 wrote to memory of 3004 736 cmd.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d490655db189715b3550c32ae75742e.exe"C:\Users\Admin\AppData\Local\Temp\2d490655db189715b3550c32ae75742e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\2d490655db189715b3550c32ae75742e.exeC:\Users\Admin\AppData\Local\Temp\2d490655db189715b3550c32ae75742e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 7163⤵
- Program crash
PID:5028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 7163⤵
- Program crash
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 7883⤵
- Program crash
PID:5052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 14563⤵
- Program crash
PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 19123⤵
- Program crash
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 21443⤵
- Program crash
PID:2324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 20963⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 19243⤵
- Program crash
PID:3712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 19923⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 19763⤵
- Program crash
PID:4996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 19243⤵
- Program crash
PID:2228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 21443⤵
- Program crash
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 19403⤵
- Program crash
PID:2344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 21123⤵
- Program crash
PID:2308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 5643⤵
- Program crash
PID:4556
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 1WOV8tOcae1c1⤵PID:3004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4064 -ip 40641⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 5641⤵
- Program crash
PID:5068
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 1WOV8tOcae1c > C:\Users\Admin\AppData\Local\Temp\drEmeIwJ.xml1⤵
- Suspicious use of WriteProcessMemory
PID:736
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\2d490655db189715b3550c32ae75742e.exe" /TN 1WOV8tOcae1c /F1⤵
- Creates scheduled task(s)
PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 6241⤵
- Program crash
PID:3488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4064 -ip 40641⤵PID:1012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4064 -ip 40641⤵PID:1124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 6321⤵
- Program crash
PID:948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4064 -ip 40641⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4064 -ip 40641⤵PID:3012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4064 -ip 40641⤵PID:3724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4064 -ip 40641⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4064 -ip 40641⤵PID:3000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4064 -ip 40641⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4064 -ip 40641⤵PID:2444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4064 -ip 40641⤵PID:3120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4064 -ip 40641⤵PID:1064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4064 -ip 40641⤵PID:2272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4064 -ip 40641⤵PID:2456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4064 -ip 40641⤵PID:2588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4064 -ip 40641⤵PID:1008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4064 -ip 40641⤵PID:1064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4064 -ip 40641⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5410fa6dcdd8c1d9bac856c19727e3b8b
SHA12d3b614ad03114f73150c0c1d5586bc019b8f3ef
SHA2569d83f12e424cdbb43b4e5238af675798459c64738a1054472b0a420872f8be6d
SHA51292617660d472be6df6d243769154c3f374ec2b298cd2c8e73ab953c9adb221d1f43e175634490bd3927472d2d2f76d0bec6f1ca20d169f44e0117cc8f3afdafe