Analysis
-
max time kernel
155s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
df975712a1332a15e0408e1b9b344e9d74376f964dc4fc579d8c7e1693bbb50f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df975712a1332a15e0408e1b9b344e9d74376f964dc4fc579d8c7e1693bbb50f.exe
Resource
win10v2004-20240226-en
General
-
Target
df975712a1332a15e0408e1b9b344e9d74376f964dc4fc579d8c7e1693bbb50f.exe
-
Size
448KB
-
MD5
8ca7af0267a85268a1af8922565554b0
-
SHA1
f726ebb629c83abdc4d926cfece28af45342466d
-
SHA256
df975712a1332a15e0408e1b9b344e9d74376f964dc4fc579d8c7e1693bbb50f
-
SHA512
465c73a4d5c7291ff87754edde41ebc07f5e7c0105721c01e3ec6e354bf9310179647c9b669ce22b69b0b4b976887e291e6e80f5b14a16f5b76725f6c69cf83f
-
SSDEEP
6144:uJgti9qKWh1aWhV40saiigCD4H2cHwXWNzDw:qgttRh1aWhVQ5zCD4TyWN4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1156 df975712a1332a15e0408e1b9b344e9d74376f964dc4fc579d8c7e1693bbb50f.exe -
Executes dropped EXE 1 IoCs
pid Process 1156 df975712a1332a15e0408e1b9b344e9d74376f964dc4fc579d8c7e1693bbb50f.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3244 4600 WerFault.exe 89 3312 1156 WerFault.exe 96 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4600 df975712a1332a15e0408e1b9b344e9d74376f964dc4fc579d8c7e1693bbb50f.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1156 df975712a1332a15e0408e1b9b344e9d74376f964dc4fc579d8c7e1693bbb50f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4600 wrote to memory of 1156 4600 df975712a1332a15e0408e1b9b344e9d74376f964dc4fc579d8c7e1693bbb50f.exe 96 PID 4600 wrote to memory of 1156 4600 df975712a1332a15e0408e1b9b344e9d74376f964dc4fc579d8c7e1693bbb50f.exe 96 PID 4600 wrote to memory of 1156 4600 df975712a1332a15e0408e1b9b344e9d74376f964dc4fc579d8c7e1693bbb50f.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\df975712a1332a15e0408e1b9b344e9d74376f964dc4fc579d8c7e1693bbb50f.exe"C:\Users\Admin\AppData\Local\Temp\df975712a1332a15e0408e1b9b344e9d74376f964dc4fc579d8c7e1693bbb50f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 3962⤵
- Program crash
PID:3244
-
-
C:\Users\Admin\AppData\Local\Temp\df975712a1332a15e0408e1b9b344e9d74376f964dc4fc579d8c7e1693bbb50f.exeC:\Users\Admin\AppData\Local\Temp\df975712a1332a15e0408e1b9b344e9d74376f964dc4fc579d8c7e1693bbb50f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 3643⤵
- Program crash
PID:3312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4600 -ip 46001⤵PID:4776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1156 -ip 11561⤵PID:4376
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\df975712a1332a15e0408e1b9b344e9d74376f964dc4fc579d8c7e1693bbb50f.exe
Filesize448KB
MD5cac2e343d20235e1a846e4f2c6d69482
SHA1738e19038ba6b81d339553d22cac33357a88a561
SHA256148ae1911464084f8e3f8080177faf9999cf4e52995275e0535dbaf657c8298c
SHA5123efe6b12c614488070d1add9899bb3d5e614bf2d3fd2dbe08d5772abc35004f745f5404caaa88322bd81bbfc05201b066955bdd0757c90d3426457dc397ed871