Analysis
-
max time kernel
92s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
705100854d63bef580bae73c6576135794216298da8a075275bcf5099606b569.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
705100854d63bef580bae73c6576135794216298da8a075275bcf5099606b569.exe
Resource
win10v2004-20231215-en
General
-
Target
705100854d63bef580bae73c6576135794216298da8a075275bcf5099606b569.exe
-
Size
209KB
-
MD5
7b38faa6b1ee4d3a26bc80947f7ca3bf
-
SHA1
4ae8c5a10a16bd9bb38c7ba9d48ebe417b5fbf3e
-
SHA256
705100854d63bef580bae73c6576135794216298da8a075275bcf5099606b569
-
SHA512
20cec09b42dfc5d852cac75a40374845448d27ff47686b980ebbf66a90975d301505d6b0ba6c0e7a691f5a085818611fceeaa327b34c73c13dc1305926278621
-
SSDEEP
6144:lnw7tPg/EnrM9gbmO4V9vjFTa8SHQAe5+4eNsapJ1VrZtfXp:lnw7tZnigSOYF+86z4e2ap1Vtfp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4036 705100854d63bef580bae73c6576135794216298da8a075275bcf5099606b569.exe -
Executes dropped EXE 1 IoCs
pid Process 4036 705100854d63bef580bae73c6576135794216298da8a075275bcf5099606b569.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1276 4652 WerFault.exe 83 5024 4036 WerFault.exe 88 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4652 705100854d63bef580bae73c6576135794216298da8a075275bcf5099606b569.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4036 705100854d63bef580bae73c6576135794216298da8a075275bcf5099606b569.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4652 wrote to memory of 4036 4652 705100854d63bef580bae73c6576135794216298da8a075275bcf5099606b569.exe 88 PID 4652 wrote to memory of 4036 4652 705100854d63bef580bae73c6576135794216298da8a075275bcf5099606b569.exe 88 PID 4652 wrote to memory of 4036 4652 705100854d63bef580bae73c6576135794216298da8a075275bcf5099606b569.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\705100854d63bef580bae73c6576135794216298da8a075275bcf5099606b569.exe"C:\Users\Admin\AppData\Local\Temp\705100854d63bef580bae73c6576135794216298da8a075275bcf5099606b569.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 3962⤵
- Program crash
PID:1276
-
-
C:\Users\Admin\AppData\Local\Temp\705100854d63bef580bae73c6576135794216298da8a075275bcf5099606b569.exeC:\Users\Admin\AppData\Local\Temp\705100854d63bef580bae73c6576135794216298da8a075275bcf5099606b569.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 3643⤵
- Program crash
PID:5024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4652 -ip 46521⤵PID:3692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4036 -ip 40361⤵PID:3028
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\705100854d63bef580bae73c6576135794216298da8a075275bcf5099606b569.exe
Filesize209KB
MD506b3e60f59d3644ba0d525b695d2b7a3
SHA1d0d3c0a24c8db482acb67a050e5513cd58abeecb
SHA256e059bada652c1d39f87a87510bce9d56b342adb1652d6910badefacc93ecc6fd
SHA512748b23278369501a5016db8fb5b5c9b395f7baef3c093fd4d551ff4095a82e63dea2f299e35667c0c99b97d10ab95db220fc9417c71daa04e71068c76ca02f8f