Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 16:58
Static task
static1
Behavioral task
behavioral1
Sample
1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe
Resource
win10v2004-20240226-en
General
-
Target
1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe
-
Size
5.8MB
-
MD5
fa7fa2d7565c8444e201214b4f979d2c
-
SHA1
411b27b756809992dbdcb29042037b92939ddac7
-
SHA256
1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd
-
SHA512
75ad72235d4344b66971e0fcb03d0ac257d146a71eb1841a37aa3c4c26012b3111c7d33050ba773610fa99aa0cb6c3c30d01bafe8ad43b5c0767c0cdc9e0cd88
-
SSDEEP
98304:ky/lybei/B///uGcKfjmFns+8Y4uZpl6CNXUa7V1/qSAPNodl/U+hiSotgnr:Ty/p/uBFfn6STtZHU+hz
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2036 2920 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2920 1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2920 1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2036 2920 1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe 28 PID 2920 wrote to memory of 2036 2920 1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe 28 PID 2920 wrote to memory of 2036 2920 1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe 28 PID 2920 wrote to memory of 2036 2920 1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe"C:\Users\Admin\AppData\Local\Temp\1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 1322⤵
- Loads dropped DLL
- Program crash
PID:2036
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe
Filesize1.5MB
MD555fb3de9042be3edb0dda005137e6945
SHA1d1e6d74cb480e70005f7569ff4fefee439f5d6e8
SHA2564c182cc15a2050a81f618c602e2292f80db098b645d30e80e4b913be4cfd7059
SHA512a9a5b0ad154d756ee83aaa716fe8c1d4e3e16d8c2550a774609ef0b4ba9f92605fb3aaf4ce4dcd75b887d605f0ad4f44bfa5fa2fcdc74bd5761c5e6e48de56ad
-
\Users\Admin\AppData\Local\Temp\1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe
Filesize1.3MB
MD571d270d125dec0f6a49dfdaf02c0b505
SHA1c68b9e23d61096c04e0773a731ba7545cb4493a0
SHA256c9503074a5cf903cae2382160c42684ad95da2728cd5517efcd27ed8cf3dfcd3
SHA5129fe662fb44536bd81d01c559075339fa6868026d0eaaaf17f98c7b141fe699bee3d65bfce7b874e8f76fe659f09aaebacd83171b1766c7e0660623255647fa09
-
\Users\Admin\AppData\Local\Temp\1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe
Filesize1.3MB
MD54f57225f2722eb0b47c62d383e1115ce
SHA1e54a40655029a685de5ac115c454863efa279c46
SHA25673d469b28bd67c4e226a28965c50ad75ad8928455d1563ac7ed91da2844092a6
SHA5127a8c077fa7591c7bab53f312467f19e7e174aed222066c957a42638cec8b64168e9668173076fd6da6817adb6e5cc0dbf287a0e02a646ee167b233d63447cb4f
-
\Users\Admin\AppData\Local\Temp\1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe
Filesize1.3MB
MD5e63de5853c46f015c69b2848d918a45f
SHA17014ca54c03c56c50e3d5a1890b6535e4aba0b17
SHA25665a8b36b68212697763cd103c7be14c24a159f813300ea0f9aee9bfab42827d3
SHA512769789f6d2e956c1860641be13276219d2fa0fcaea37c39ebd8a13bd1fa931e0da174c99f17e9733f87813fcc57f1ef9164d7015583c0480f9f43625ea8fa1a1
-
\Users\Admin\AppData\Local\Temp\1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe
Filesize1.2MB
MD5c8093f89411bcd1ee5c2c5367f782910
SHA13c6f8e1f3c0e7af6e00f22c0ea513fb538c52c68
SHA2565b510088093eb919131e3315b56303b9c4dd234109196ba2a02a3fcf8e321fcf
SHA5128e501c086ac35217b09a55b52e1347228a350d65281e9ee45b459f0f28cc9b4131c7c80c89fee0a09b926cc8934bc1d70d6b948e61a77600e6127ca4b9201738
-
\Users\Admin\AppData\Local\Temp\1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe
Filesize1.1MB
MD511d71b1f22871874021d8ab6931fd28e
SHA164f790765c640dde9ddc100e3b90144c89654bea
SHA25628ea0f5e201540e75db03b067f01e8aadc527dfc238f374f6a18375ccbba31e9
SHA512558e6c25042440c40352070448cdfb896216db8bd75bc1b119b8677567e5e8b466d076e40e7a257334a026e6b2e1ee5b2f5586e5bcd88cfccbd6a0ea8aae2184
-
\Users\Admin\AppData\Local\Temp\1f70fc60687591d5ff2e7fe3dc460e80d8a0478f935885683a4eee1d1e97a0bd.exe
Filesize1.7MB
MD542cd5684b48ee09d381f6dd6eeb51df1
SHA14d1d477de81533a84b1b02bb95aefca6199ddc20
SHA2567931a83fd72458a49f388d4acd9f86aa2e3fbe592038c002ee54d716648e5c2e
SHA5123be7e74832ef56f95f678cea0c90ea8692270027b26da7835c6d1cc288af749a8de4d893f6684b5d2036ff244bf5e15b480504bd932386b2238f81677ddc8c37