Analysis
-
max time kernel
147s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
f0944826b4f1550cfea00549c4c3b0619bd0c022b0c7adf77224b8fea8f6c002.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f0944826b4f1550cfea00549c4c3b0619bd0c022b0c7adf77224b8fea8f6c002.exe
Resource
win10v2004-20240226-en
General
-
Target
f0944826b4f1550cfea00549c4c3b0619bd0c022b0c7adf77224b8fea8f6c002.exe
-
Size
256KB
-
MD5
459c27438f2de1a15935b3b16989de7c
-
SHA1
6825d66588d0bfcbd58f1bf9d39dc37e98e2e5e1
-
SHA256
f0944826b4f1550cfea00549c4c3b0619bd0c022b0c7adf77224b8fea8f6c002
-
SHA512
1b276cb1230d17561aa3a6b7ef07f57ee603ca6a71ef50aa05badbb50aadb4c69db708ac0595fc7ed709f11aba849c60d977f8fba66cc3207d368a81e11ad67c
-
SSDEEP
6144:MzTCcuQoAB2h9HHJtTs8p43iP+v0W7cyqCxSngmMBqf7:MSwqTnDXp6f50npM47
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3324 f0944826b4f1550cfea00549c4c3b0619bd0c022b0c7adf77224b8fea8f6c002.exe -
Executes dropped EXE 1 IoCs
pid Process 3324 f0944826b4f1550cfea00549c4c3b0619bd0c022b0c7adf77224b8fea8f6c002.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 1944 3980 WerFault.exe 86 3556 3324 WerFault.exe 95 1796 3324 WerFault.exe 95 3700 3324 WerFault.exe 95 1360 3324 WerFault.exe 95 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3980 f0944826b4f1550cfea00549c4c3b0619bd0c022b0c7adf77224b8fea8f6c002.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3324 f0944826b4f1550cfea00549c4c3b0619bd0c022b0c7adf77224b8fea8f6c002.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3980 wrote to memory of 3324 3980 f0944826b4f1550cfea00549c4c3b0619bd0c022b0c7adf77224b8fea8f6c002.exe 95 PID 3980 wrote to memory of 3324 3980 f0944826b4f1550cfea00549c4c3b0619bd0c022b0c7adf77224b8fea8f6c002.exe 95 PID 3980 wrote to memory of 3324 3980 f0944826b4f1550cfea00549c4c3b0619bd0c022b0c7adf77224b8fea8f6c002.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0944826b4f1550cfea00549c4c3b0619bd0c022b0c7adf77224b8fea8f6c002.exe"C:\Users\Admin\AppData\Local\Temp\f0944826b4f1550cfea00549c4c3b0619bd0c022b0c7adf77224b8fea8f6c002.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 3842⤵
- Program crash
PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\f0944826b4f1550cfea00549c4c3b0619bd0c022b0c7adf77224b8fea8f6c002.exeC:\Users\Admin\AppData\Local\Temp\f0944826b4f1550cfea00549c4c3b0619bd0c022b0c7adf77224b8fea8f6c002.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 3523⤵
- Program crash
PID:3556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 7683⤵
- Program crash
PID:1796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 7883⤵
- Program crash
PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 7963⤵
- Program crash
PID:1360
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3980 -ip 39801⤵PID:5116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3324 -ip 33241⤵PID:3188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3324 -ip 33241⤵PID:1800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3324 -ip 33241⤵PID:544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3324 -ip 33241⤵PID:2152
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\f0944826b4f1550cfea00549c4c3b0619bd0c022b0c7adf77224b8fea8f6c002.exe
Filesize256KB
MD5a45d13e59bacddbbfc6ca1674766bec7
SHA102a908c07e4bdcbfcf03ffc973af5236134cd276
SHA2566361ba6976189a5d8069bf76ff7bef83fde6ccc635d782eb806d5568a060ea94
SHA512ae290950f6d4896f96facf28b92ab50da6d3b135db4c69d72d7a0a43fc29427a2b2d66f2db88feb85d061ff92daed225b415b9e858b7cd107b1684d2785d2c62