Analysis
-
max time kernel
153s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
c19d1acd15a9b4d368da0bfccca41334.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c19d1acd15a9b4d368da0bfccca41334.exe
Resource
win10v2004-20240226-en
General
-
Target
c19d1acd15a9b4d368da0bfccca41334.exe
-
Size
883KB
-
MD5
c19d1acd15a9b4d368da0bfccca41334
-
SHA1
99a767667b5bc43bac2184682988ca1a6e663505
-
SHA256
ad8b4dc461af6d79a3e1d19ed2bb061f9c696721c165c0dd36895f1b3338729e
-
SHA512
68b343b64a713cdd6744d87190aa94d45be6ca6641fbf59c5154b040bc18fe9b6fc8bd0e00d962ac9e0e8957c050527287e53f0d426bffa67e64b4d1579f2481
-
SSDEEP
6144:h7o4wmAYuK6jGk6P+xOwfrXdFrpUxpf6lwABbxxJa/YES:5o4w06jT6WOwfZUxpfGjVDa/ZS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3928 c19d1acd15a9b4d368da0bfccca41334.exe -
Executes dropped EXE 1 IoCs
pid Process 3928 c19d1acd15a9b4d368da0bfccca41334.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 644 2012 WerFault.exe 95 3252 3928 WerFault.exe 106 2300 3928 WerFault.exe 106 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2012 c19d1acd15a9b4d368da0bfccca41334.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3928 c19d1acd15a9b4d368da0bfccca41334.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2012 wrote to memory of 3928 2012 c19d1acd15a9b4d368da0bfccca41334.exe 106 PID 2012 wrote to memory of 3928 2012 c19d1acd15a9b4d368da0bfccca41334.exe 106 PID 2012 wrote to memory of 3928 2012 c19d1acd15a9b4d368da0bfccca41334.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\c19d1acd15a9b4d368da0bfccca41334.exe"C:\Users\Admin\AppData\Local\Temp\c19d1acd15a9b4d368da0bfccca41334.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 3442⤵
- Program crash
PID:644
-
-
C:\Users\Admin\AppData\Local\Temp\c19d1acd15a9b4d368da0bfccca41334.exeC:\Users\Admin\AppData\Local\Temp\c19d1acd15a9b4d368da0bfccca41334.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 3443⤵
- Program crash
PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 4043⤵
- Program crash
PID:2300
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2012 -ip 20121⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3928 -ip 39281⤵PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3928 -ip 39281⤵PID:3328
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:3684
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
883KB
MD5d82b3f9b937512e16035abed5ce62384
SHA16e1b371bd6ac6e6d8cfe1363eba0c7673ccb6e76
SHA2566fde4421e78c81b7cafacb40ec8e75f5ad3c5e65bd3d7768563a8882bcf104b4
SHA5122b084e33553f9e9b668f35ea2b11c3f1e16a6606841c85092a4fd0bd6d419ba659cb114206ee6d963563d44d2675b4b4ab220152f47839de3e8093e56351f7fd