Analysis
-
max time kernel
5s -
max time network
78s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 03:16
Behavioral task
behavioral1
Sample
4f6e557c63694a2bb74e4e6f3a1adf3a.exe
Resource
win7-20231215-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
4f6e557c63694a2bb74e4e6f3a1adf3a.exe
Resource
win10v2004-20231222-en
9 signatures
150 seconds
General
-
Target
4f6e557c63694a2bb74e4e6f3a1adf3a.exe
-
Size
1003KB
-
MD5
4f6e557c63694a2bb74e4e6f3a1adf3a
-
SHA1
685b75955b97ef19898138a4b9d0be6a222bc430
-
SHA256
7dbbc9b80731999cf53cf3a35224c8d2605a261ffba70c562240526ad52b68bb
-
SHA512
803d5c6331dd1071c2c1a1b3f58f8f70a04d018d70389e6d731aa27ce6216946ebc1b7280bbeb6d9a7887f5c16f49f33e7461848276fe59ea203a69d041a83b1
-
SSDEEP
24576:k+SikxrDBxh4H0sHy/VbJEmL1OhyvXzhcde+i169Qevyq7jj:k1Rxhxk0sS/VNEmL1O4vXz6dK1QQkyqr
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5044 4f6e557c63694a2bb74e4e6f3a1adf3a.exe -
Executes dropped EXE 1 IoCs
pid Process 5044 4f6e557c63694a2bb74e4e6f3a1adf3a.exe -
resource yara_rule behavioral2/memory/4376-0-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 3 IoCs
pid pid_target Process procid_target 664 5044 WerFault.exe 3012 5044 WerFault.exe 1764 5044 WerFault.exe 31 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2420 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4376 4f6e557c63694a2bb74e4e6f3a1adf3a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4376 4f6e557c63694a2bb74e4e6f3a1adf3a.exe 5044 4f6e557c63694a2bb74e4e6f3a1adf3a.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4376 wrote to memory of 5044 4376 4f6e557c63694a2bb74e4e6f3a1adf3a.exe 31 PID 4376 wrote to memory of 5044 4376 4f6e557c63694a2bb74e4e6f3a1adf3a.exe 31 PID 4376 wrote to memory of 5044 4376 4f6e557c63694a2bb74e4e6f3a1adf3a.exe 31 PID 5044 wrote to memory of 2420 5044 4f6e557c63694a2bb74e4e6f3a1adf3a.exe 28 PID 5044 wrote to memory of 2420 5044 4f6e557c63694a2bb74e4e6f3a1adf3a.exe 28 PID 5044 wrote to memory of 2420 5044 4f6e557c63694a2bb74e4e6f3a1adf3a.exe 28 PID 5044 wrote to memory of 3452 5044 4f6e557c63694a2bb74e4e6f3a1adf3a.exe 27 PID 5044 wrote to memory of 3452 5044 4f6e557c63694a2bb74e4e6f3a1adf3a.exe 27 PID 5044 wrote to memory of 3452 5044 4f6e557c63694a2bb74e4e6f3a1adf3a.exe 27 PID 3452 wrote to memory of 3476 3452 cmd.exe 20 PID 3452 wrote to memory of 3476 3452 cmd.exe 20 PID 3452 wrote to memory of 3476 3452 cmd.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f6e557c63694a2bb74e4e6f3a1adf3a.exe"C:\Users\Admin\AppData\Local\Temp\4f6e557c63694a2bb74e4e6f3a1adf3a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\4f6e557c63694a2bb74e4e6f3a1adf3a.exeC:\Users\Admin\AppData\Local\Temp\4f6e557c63694a2bb74e4e6f3a1adf3a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 9763⤵
- Program crash
PID:1764
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 0Su7L8S745c11⤵PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5044 -ip 50441⤵PID:1144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 6161⤵
- Program crash
PID:664
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 0Su7L8S745c1 > C:\Users\Admin\AppData\Local\Temp\C6pAyi.xml1⤵
- Suspicious use of WriteProcessMemory
PID:3452
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\4f6e557c63694a2bb74e4e6f3a1adf3a.exe" /TN 0Su7L8S745c1 /F1⤵
- Creates scheduled task(s)
PID:2420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5044 -ip 50441⤵PID:2992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 6361⤵
- Program crash
PID:3012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5044 -ip 50441⤵PID:628