Analysis

  • max time kernel
    149s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2024, 20:54

General

  • Target

    8b239cdbfef7d7548d2c90346f8b2c672fad96c4776c4eab3536cec3de1d6331.exe

  • Size

    192KB

  • MD5

    96952c967785066bc967b32f5c872cd8

  • SHA1

    fef744d200a63aae14bf0ead86c365bef6744155

  • SHA256

    8b239cdbfef7d7548d2c90346f8b2c672fad96c4776c4eab3536cec3de1d6331

  • SHA512

    c3f1b9a1c125d4ae5c2ae535d36e8cb7305b60cb5ff7579d505365cf787c3ae8f50fe9aba1749ccf4a5026c539e569f19e000f261050987e9441d176eacf2203

  • SSDEEP

    3072:X57bDPy1K271oZvVLczuDrjdGzgvcTMvgWih9lPMU97yHzoVkCl8BsYkjLlNNNIC:Jbjw76rjBkNWihRys+I8BEjLlNIDEqZq

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Program crash 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b239cdbfef7d7548d2c90346f8b2c672fad96c4776c4eab3536cec3de1d6331.exe
    "C:\Users\Admin\AppData\Local\Temp\8b239cdbfef7d7548d2c90346f8b2c672fad96c4776c4eab3536cec3de1d6331.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3192
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 324
      2⤵
      • Program crash
      PID:4952
    • C:\Users\Admin\AppData\Local\Temp\8b239cdbfef7d7548d2c90346f8b2c672fad96c4776c4eab3536cec3de1d6331.exe
      C:\Users\Admin\AppData\Local\Temp\8b239cdbfef7d7548d2c90346f8b2c672fad96c4776c4eab3536cec3de1d6331.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4628
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 360
        3⤵
        • Program crash
        PID:4820
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 768
        3⤵
        • Program crash
        PID:3576
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 788
        3⤵
        • Program crash
        PID:1216
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 772
        3⤵
        • Program crash
        PID:4664
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 3192 -ip 3192
    1⤵
      PID:3256
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4628 -ip 4628
      1⤵
        PID:2272
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4628 -ip 4628
        1⤵
          PID:2956
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4628 -ip 4628
          1⤵
            PID:4380
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3724 --field-trial-handle=2972,i,4036376905309803364,5412922217215781933,262144 --variations-seed-version /prefetch:8
            1⤵
              PID:3416
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4628 -ip 4628
              1⤵
                PID:4160

              Network

              MITRE ATT&CK Matrix

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\8b239cdbfef7d7548d2c90346f8b2c672fad96c4776c4eab3536cec3de1d6331.exe

                Filesize

                192KB

                MD5

                ae24d7e71d04b0c7b7caff7f14b988b5

                SHA1

                94889ac1e22205f69264f0d4a7c3faacaea0eb69

                SHA256

                9401f664ba06fd90ca70b612d643b6af91f4fac3304029240e264e2e65d3e1bd

                SHA512

                4dbf7cc79603224a37998a0fe92a937ec0fbace19181b9b8da5e6edac3992313178e2b68daa04842dc2fae91d8cf5b048723ad98702b829ea35abb76cc3e3eb5

              • memory/3192-0-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/3192-7-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/4628-6-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/4628-8-0x0000000004DE0000-0x0000000004E18000-memory.dmp

                Filesize

                224KB

              • memory/4628-9-0x0000000000400000-0x0000000000415000-memory.dmp

                Filesize

                84KB