Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 23:45
Static task
static1
Behavioral task
behavioral1
Sample
b064352079a17e7cd492a86bb5e25721ceec9603bfefa8096314c7e74452a1d8.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b064352079a17e7cd492a86bb5e25721ceec9603bfefa8096314c7e74452a1d8.exe
Resource
win10v2004-20240226-en
General
-
Target
b064352079a17e7cd492a86bb5e25721ceec9603bfefa8096314c7e74452a1d8.exe
-
Size
448KB
-
MD5
7fa475d76b90a940b0237f654e0f5ea2
-
SHA1
f36d69b109404060b2bed3e297635ef2d0ef13eb
-
SHA256
b064352079a17e7cd492a86bb5e25721ceec9603bfefa8096314c7e74452a1d8
-
SHA512
56ae8db953556cbbde4d6a4ca6e5527a4e11af1db62d3469f5c6832e177d7571559c397293e17d666e6308103806c8f335c14bace9a075dccc4115c37d9d86ef
-
SSDEEP
6144:Bn2bJyeCgpLYhEcHc8DaOlKAOfNIDEqZK0W7cyqCxSngmMBqfycuPbUl0i5cD5J9:Be0hEcg/VwEqZQ0npM4dl0v5JdmY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1196 b064352079a17e7cd492a86bb5e25721ceec9603bfefa8096314c7e74452a1d8.exe -
Executes dropped EXE 1 IoCs
pid Process 1196 b064352079a17e7cd492a86bb5e25721ceec9603bfefa8096314c7e74452a1d8.exe -
Program crash 7 IoCs
pid pid_target Process procid_target 3332 2484 WerFault.exe 88 212 1196 WerFault.exe 95 3796 1196 WerFault.exe 95 8 1196 WerFault.exe 95 2528 1196 WerFault.exe 95 2320 1196 WerFault.exe 95 2748 1196 WerFault.exe 95 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2484 b064352079a17e7cd492a86bb5e25721ceec9603bfefa8096314c7e74452a1d8.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1196 b064352079a17e7cd492a86bb5e25721ceec9603bfefa8096314c7e74452a1d8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2484 wrote to memory of 1196 2484 b064352079a17e7cd492a86bb5e25721ceec9603bfefa8096314c7e74452a1d8.exe 95 PID 2484 wrote to memory of 1196 2484 b064352079a17e7cd492a86bb5e25721ceec9603bfefa8096314c7e74452a1d8.exe 95 PID 2484 wrote to memory of 1196 2484 b064352079a17e7cd492a86bb5e25721ceec9603bfefa8096314c7e74452a1d8.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b064352079a17e7cd492a86bb5e25721ceec9603bfefa8096314c7e74452a1d8.exe"C:\Users\Admin\AppData\Local\Temp\b064352079a17e7cd492a86bb5e25721ceec9603bfefa8096314c7e74452a1d8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 3842⤵
- Program crash
PID:3332
-
-
C:\Users\Admin\AppData\Local\Temp\b064352079a17e7cd492a86bb5e25721ceec9603bfefa8096314c7e74452a1d8.exeC:\Users\Admin\AppData\Local\Temp\b064352079a17e7cd492a86bb5e25721ceec9603bfefa8096314c7e74452a1d8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 3523⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 7683⤵
- Program crash
PID:3796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 8083⤵
- Program crash
PID:8
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 7763⤵
- Program crash
PID:2528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 7923⤵
- Program crash
PID:2320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 8003⤵
- Program crash
PID:2748
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2484 -ip 24841⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1196 -ip 11961⤵PID:3248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1196 -ip 11961⤵PID:624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1196 -ip 11961⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1196 -ip 11961⤵PID:2460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1196 -ip 11961⤵PID:2392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1196 -ip 11961⤵PID:408
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\b064352079a17e7cd492a86bb5e25721ceec9603bfefa8096314c7e74452a1d8.exe
Filesize448KB
MD53687eb03d19a62c1ed21de519113808c
SHA1626ca791f5195840c4c0323aad48e99559097640
SHA256f947b95d4ddcac026a0368703350cddc3d7e60d293a1a77da985e93e50bee9c1
SHA512a3825048dbf91e9cf65a3925b6f77f26306ab84d5fdf938edd5a9dd9292dbe4e504f074e5893e4c5bd8a99a6bae393bac08dc0b496a494de80e4edd6146ee7cb