Analysis
-
max time kernel
158s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 15:25
Behavioral task
behavioral1
Sample
c3b3e606509feb13c4ac729cb418cbe6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3b3e606509feb13c4ac729cb418cbe6.exe
Resource
win10v2004-20240226-en
General
-
Target
c3b3e606509feb13c4ac729cb418cbe6.exe
-
Size
3.9MB
-
MD5
c3b3e606509feb13c4ac729cb418cbe6
-
SHA1
65d2f50295f99ecd9175b4d693e31aa8743540fe
-
SHA256
09ba5401dca6976ed4bf55cae47b2b2f489829e329ad8a573120f5584a9872cb
-
SHA512
94fe6ddd1dc56783051be880be5b35b2841bb480023492aa18909c92f2fb24da5a0925644fca91a1c9e9122d54058b9a575befb452fa4ef2bb0dbd713456b07d
-
SSDEEP
98304:uu7FXGONOA9zyULG+kgd8pVPH+A9zyULG+/mQy8mYA9zyULG+kgd8pVPH+A9zyU1:j9GizLqEglHPzLq0O8mVzLqEglHPzLq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 640 c3b3e606509feb13c4ac729cb418cbe6.exe -
Executes dropped EXE 1 IoCs
pid Process 640 c3b3e606509feb13c4ac729cb418cbe6.exe -
resource yara_rule behavioral2/memory/2020-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/memory/2020-1-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/files/0x0007000000023278-13.dat upx behavioral2/memory/640-15-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 39 pastebin.com -
Program crash 4 IoCs
pid pid_target Process procid_target 952 640 WerFault.exe 98 528 640 WerFault.exe 98 4500 640 WerFault.exe 98 1832 640 WerFault.exe 98 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3944 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2020 c3b3e606509feb13c4ac729cb418cbe6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2020 c3b3e606509feb13c4ac729cb418cbe6.exe 640 c3b3e606509feb13c4ac729cb418cbe6.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2020 wrote to memory of 640 2020 c3b3e606509feb13c4ac729cb418cbe6.exe 98 PID 2020 wrote to memory of 640 2020 c3b3e606509feb13c4ac729cb418cbe6.exe 98 PID 2020 wrote to memory of 640 2020 c3b3e606509feb13c4ac729cb418cbe6.exe 98 PID 640 wrote to memory of 3944 640 c3b3e606509feb13c4ac729cb418cbe6.exe 100 PID 640 wrote to memory of 3944 640 c3b3e606509feb13c4ac729cb418cbe6.exe 100 PID 640 wrote to memory of 3944 640 c3b3e606509feb13c4ac729cb418cbe6.exe 100 PID 640 wrote to memory of 4636 640 c3b3e606509feb13c4ac729cb418cbe6.exe 102 PID 640 wrote to memory of 4636 640 c3b3e606509feb13c4ac729cb418cbe6.exe 102 PID 640 wrote to memory of 4636 640 c3b3e606509feb13c4ac729cb418cbe6.exe 102 PID 4636 wrote to memory of 824 4636 cmd.exe 104 PID 4636 wrote to memory of 824 4636 cmd.exe 104 PID 4636 wrote to memory of 824 4636 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3b3e606509feb13c4ac729cb418cbe6.exe"C:\Users\Admin\AppData\Local\Temp\c3b3e606509feb13c4ac729cb418cbe6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\c3b3e606509feb13c4ac729cb418cbe6.exeC:\Users\Admin\AppData\Local\Temp\c3b3e606509feb13c4ac729cb418cbe6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c3b3e606509feb13c4ac729cb418cbe6.exe" /TN v3dGbWFyc353 /F3⤵
- Creates scheduled task(s)
PID:3944
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN v3dGbWFyc353 > C:\Users\Admin\AppData\Local\Temp\RZdBAbYGr.xml3⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN v3dGbWFyc3534⤵PID:824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 6123⤵
- Program crash
PID:952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 6043⤵
- Program crash
PID:528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 6003⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 7403⤵
- Program crash
PID:1832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 640 -ip 6401⤵PID:2192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 640 -ip 6401⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 640 -ip 6401⤵PID:2276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 640 -ip 6401⤵PID:4396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:4476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD562b8494265483cb6910a0cf773deeee4
SHA19a86a3da24762b7f1bc932fb31a44d4a19d41a09
SHA256087f110689c42cef2f5dfbb49ef25caeced35473e477a0893bcee3d50e8bd679
SHA512dfd36265d850b0b65294a4d72d63ada9a8ea5cfc112281ca1bc428690c2b020368141ffd69d1fc4f42888c22ef6d3963c3fa6be595f62f6798aa1f7aa2cf9bab
-
Filesize
1.2MB
MD57d8083f6e29c1ea7629ea70897e895c5
SHA16de45fedb6e624c231f301fb215b820bf00b5d3a
SHA256a13d2e56ca73c53bd70abeb80c6e6e90537719857bd05cff6fda1055ad7b121e
SHA51214f4380a967a73a70f05566e3f7c8daf536f2a82030e4d2bcb5a41b670754234c4f12a103cbb24597875d2e78ac14bd9ccbe6a5748039c269c9a089619b57661