Analysis
-
max time kernel
163s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
8493bf4b520a841422a4ead2b59c042a0683d36d9ca4efb4cdc9c294e60cf592.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8493bf4b520a841422a4ead2b59c042a0683d36d9ca4efb4cdc9c294e60cf592.exe
Resource
win10v2004-20240226-en
General
-
Target
8493bf4b520a841422a4ead2b59c042a0683d36d9ca4efb4cdc9c294e60cf592.exe
-
Size
576KB
-
MD5
a354b62bd12652d0b59ec06d593456c5
-
SHA1
3167bfde3e3d6618f38624a62e82c3f28aeacc0d
-
SHA256
8493bf4b520a841422a4ead2b59c042a0683d36d9ca4efb4cdc9c294e60cf592
-
SHA512
5af71fcba03336dfd44a063071c9866f72e4b5e02830824dff5b3a945d9c83dcbe377d60a4799e84f8c34e05993005445001925daea44206704539298bdfbd76
-
SSDEEP
12288:8eXq3tnI1J54cYTREylX6D9d9pA6etej3uC+IOJ5DF:vgI141FngZKnJpF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4576 8493bf4b520a841422a4ead2b59c042a0683d36d9ca4efb4cdc9c294e60cf592.exe -
Executes dropped EXE 1 IoCs
pid Process 4576 8493bf4b520a841422a4ead2b59c042a0683d36d9ca4efb4cdc9c294e60cf592.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 4488 4576 WerFault.exe 101 1664 4576 WerFault.exe 101 564 4576 WerFault.exe 101 3320 4576 WerFault.exe 101 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4856 8493bf4b520a841422a4ead2b59c042a0683d36d9ca4efb4cdc9c294e60cf592.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4576 8493bf4b520a841422a4ead2b59c042a0683d36d9ca4efb4cdc9c294e60cf592.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4856 wrote to memory of 4576 4856 8493bf4b520a841422a4ead2b59c042a0683d36d9ca4efb4cdc9c294e60cf592.exe 101 PID 4856 wrote to memory of 4576 4856 8493bf4b520a841422a4ead2b59c042a0683d36d9ca4efb4cdc9c294e60cf592.exe 101 PID 4856 wrote to memory of 4576 4856 8493bf4b520a841422a4ead2b59c042a0683d36d9ca4efb4cdc9c294e60cf592.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\8493bf4b520a841422a4ead2b59c042a0683d36d9ca4efb4cdc9c294e60cf592.exe"C:\Users\Admin\AppData\Local\Temp\8493bf4b520a841422a4ead2b59c042a0683d36d9ca4efb4cdc9c294e60cf592.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\8493bf4b520a841422a4ead2b59c042a0683d36d9ca4efb4cdc9c294e60cf592.exeC:\Users\Admin\AppData\Local\Temp\8493bf4b520a841422a4ead2b59c042a0683d36d9ca4efb4cdc9c294e60cf592.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 3523⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 7683⤵
- Program crash
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 7883⤵
- Program crash
PID:564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 8003⤵
- Program crash
PID:3320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4856 -ip 48561⤵PID:3528
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3696 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4576 -ip 45761⤵PID:2104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4576 -ip 45761⤵PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4576 -ip 45761⤵PID:2976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4576 -ip 45761⤵PID:4536
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8493bf4b520a841422a4ead2b59c042a0683d36d9ca4efb4cdc9c294e60cf592.exe
Filesize576KB
MD5fd25215e25978f751b76744c9a27eb12
SHA1869de2b552622e48afece693ed22fce123ec729c
SHA256488cdb869e410cb76453a8e0ddc003e74c3265f544f7e2b9d80d4c3a5dd10409
SHA512f0971c95b0ec5bdfe57ac9ac762b481ebdfd60d2895b337c03619931c4ba74dbfbec309de864fd8a1ba6b61ff3270f65efb21ec2a2a13050f31c9afc8119a83a