Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/01/2024, 23:20

General

  • Target

    4cb7b95f3ca9b08e93b91bebd4a98448.exe

  • Size

    1003KB

  • MD5

    4cb7b95f3ca9b08e93b91bebd4a98448

  • SHA1

    e4b73a6d369ae54e1f9854587dfd9d2acf8c4ef0

  • SHA256

    6c85d4296d60f01a37ea32ff966b6d8580138712182fa369d7abc2211e6b3f38

  • SHA512

    afb8d86bf217ad0d505a4409dfd124193e794a0c5142b6c04d56e7967b1fb7d8d86065f93a5fe5a24d7f6b4b51bcb6fd9f94787e5f76e9a72949045a6d840b40

  • SSDEEP

    24576:O2BPdx69QSbUX16WBcjukL2CDYibq6/yqLNaF:O2BFxWQSbUl6WBcakLz0ibq6yqh

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Program crash 17 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\SysWOW64\schtasks.exe
    schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\4cb7b95f3ca9b08e93b91bebd4a98448.exe" /TN mCaqQXkK46ae /F
    1⤵
    • Creates scheduled task(s)
    PID:3096
  • C:\Windows\SysWOW64\schtasks.exe
    schtasks.exe /Query /XML /TN mCaqQXkK46ae
    1⤵
      PID:2144
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1644 -ip 1644
      1⤵
        PID:224
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 612
        1⤵
        • Program crash
        PID:3180
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1644 -ip 1644
        1⤵
          PID:4080
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 620
          1⤵
          • Program crash
          PID:4772
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c schtasks.exe /Query /XML /TN mCaqQXkK46ae > C:\Users\Admin\AppData\Local\Temp\n7QflHG9.xml
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:2388
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1644 -ip 1644
          1⤵
            PID:3968
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 652
            1⤵
            • Program crash
            PID:3168
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1644 -ip 1644
            1⤵
              PID:2416
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 732
              1⤵
              • Program crash
              PID:880
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1644 -ip 1644
              1⤵
                PID:4444
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 724
                1⤵
                • Program crash
                PID:692
              • C:\Users\Admin\AppData\Local\Temp\4cb7b95f3ca9b08e93b91bebd4a98448.exe
                C:\Users\Admin\AppData\Local\Temp\4cb7b95f3ca9b08e93b91bebd4a98448.exe
                1⤵
                • Deletes itself
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious use of UnmapMainImage
                • Suspicious use of WriteProcessMemory
                PID:1644
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 752
                  2⤵
                  • Program crash
                  PID:3352
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 1456
                  2⤵
                  • Program crash
                  PID:3644
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 1916
                  2⤵
                  • Program crash
                  PID:2020
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 2144
                  2⤵
                  • Program crash
                  PID:5056
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 1932
                  2⤵
                  • Program crash
                  PID:1256
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 1924
                  2⤵
                  • Program crash
                  PID:4880
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 1992
                  2⤵
                  • Program crash
                  PID:3500
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 2104
                  2⤵
                  • Program crash
                  PID:2364
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 1976
                  2⤵
                  • Program crash
                  PID:2928
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 1956
                  2⤵
                  • Program crash
                  PID:3120
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 2168
                  2⤵
                  • Program crash
                  PID:4276
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 712
                  2⤵
                  • Program crash
                  PID:1820
              • C:\Users\Admin\AppData\Local\Temp\4cb7b95f3ca9b08e93b91bebd4a98448.exe
                "C:\Users\Admin\AppData\Local\Temp\4cb7b95f3ca9b08e93b91bebd4a98448.exe"
                1⤵
                • Suspicious behavior: RenamesItself
                • Suspicious use of UnmapMainImage
                • Suspicious use of WriteProcessMemory
                PID:1456
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1644 -ip 1644
                1⤵
                  PID:232
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1644 -ip 1644
                  1⤵
                    PID:4128
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1644 -ip 1644
                    1⤵
                      PID:4388
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1644 -ip 1644
                      1⤵
                        PID:2676
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1644 -ip 1644
                        1⤵
                          PID:4940
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1644 -ip 1644
                          1⤵
                            PID:2432
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1644 -ip 1644
                            1⤵
                              PID:4080
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1644 -ip 1644
                              1⤵
                                PID:3788
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 1644 -ip 1644
                                1⤵
                                  PID:2416
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1644 -ip 1644
                                  1⤵
                                    PID:5060
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1644 -ip 1644
                                    1⤵
                                      PID:4820
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1644 -ip 1644
                                      1⤵
                                        PID:2848

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Temp\4cb7b95f3ca9b08e93b91bebd4a98448.exe

                                        Filesize

                                        30KB

                                        MD5

                                        525669b6ecffdd95e58ac16a2bd9db37

                                        SHA1

                                        5b26046bbc12f23e66bae87e7ac9932f342cdb97

                                        SHA256

                                        62400360d3e4c54d9f8b48216250506027507ddfeaa833c012c8ce8df75adefb

                                        SHA512

                                        6f26618354f24d50a9bcad7e03d0bbfd335d83bd9afa24bd7052af1f8dc902883aa84df4b1edbf01f5ee384546e00257949f3794f2a7d8adc0c6e06726af760a

                                      • C:\Users\Admin\AppData\Local\Temp\n7QflHG9.xml

                                        Filesize

                                        1KB

                                        MD5

                                        88d41cedb64e785df01008f7797db129

                                        SHA1

                                        57dd287373808f274f2b63deef5df3aa59b4c399

                                        SHA256

                                        503b4a5c7459ba15160622a0b5f451d25e617316572f5dee7a7531a7db66c072

                                        SHA512

                                        727d68a258d468ed233ec3901835958fc78f78757a8c9aeec9d6edc44f8049ffe616935a0b5c5fafcf3ae0e46e3d198a1ea41074c23962cc4efb9d4ffcb44abd

                                      • memory/1456-0-0x0000000000400000-0x000000000065C000-memory.dmp

                                        Filesize

                                        2.4MB

                                      • memory/1456-7-0x0000000001720000-0x000000000179E000-memory.dmp

                                        Filesize

                                        504KB

                                      • memory/1456-13-0x0000000000400000-0x000000000046B000-memory.dmp

                                        Filesize

                                        428KB

                                      • memory/1456-1-0x0000000000400000-0x000000000046B000-memory.dmp

                                        Filesize

                                        428KB

                                      • memory/1644-17-0x0000000000400000-0x000000000065C000-memory.dmp

                                        Filesize

                                        2.4MB

                                      • memory/1644-23-0x0000000000400000-0x000000000045B000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/1644-22-0x00000000004B0000-0x000000000051B000-memory.dmp

                                        Filesize

                                        428KB

                                      • memory/1644-15-0x0000000001880000-0x00000000018FE000-memory.dmp

                                        Filesize

                                        504KB

                                      • memory/1644-40-0x0000000000400000-0x000000000065C000-memory.dmp

                                        Filesize

                                        2.4MB