Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 20:16
Static task
static1
Behavioral task
behavioral1
Sample
b68fbb83eb78ebabce7754c2642eae67.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b68fbb83eb78ebabce7754c2642eae67.exe
Resource
win10v2004-20231215-en
General
-
Target
b68fbb83eb78ebabce7754c2642eae67.exe
-
Size
832KB
-
MD5
b68fbb83eb78ebabce7754c2642eae67
-
SHA1
cfc91bd18ae1629939ef9123eaff028306abe809
-
SHA256
99de28e9a1179c6ffe98ca4f6c03c051a435f8e6d913ca37905ffb0e3dd91546
-
SHA512
4a645145afc448f057d325397bec70e3001738e5c20a505bccec09c55679ea379508d96421b1e4f24dd145afa024fb6b4c2ea314af21fb0e486b45c44b296b5a
-
SSDEEP
12288:nUJ8ahYDZfUFY+0sj6D9d9pA6etej3uC+IOJ5D9d9pA20ER1Oxffk:nUJ8gTtjgZKnJpx0Xhk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 b68fbb83eb78ebabce7754c2642eae67.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 b68fbb83eb78ebabce7754c2642eae67.exe -
Program crash 7 IoCs
pid pid_target Process procid_target 2616 2856 WerFault.exe 86 4128 3052 WerFault.exe 90 1328 3052 WerFault.exe 90 1824 3052 WerFault.exe 90 1416 3052 WerFault.exe 90 3216 3052 WerFault.exe 90 3272 3052 WerFault.exe 90 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2856 b68fbb83eb78ebabce7754c2642eae67.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3052 b68fbb83eb78ebabce7754c2642eae67.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2856 wrote to memory of 3052 2856 b68fbb83eb78ebabce7754c2642eae67.exe 90 PID 2856 wrote to memory of 3052 2856 b68fbb83eb78ebabce7754c2642eae67.exe 90 PID 2856 wrote to memory of 3052 2856 b68fbb83eb78ebabce7754c2642eae67.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b68fbb83eb78ebabce7754c2642eae67.exe"C:\Users\Admin\AppData\Local\Temp\b68fbb83eb78ebabce7754c2642eae67.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 3842⤵
- Program crash
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\b68fbb83eb78ebabce7754c2642eae67.exeC:\Users\Admin\AppData\Local\Temp\b68fbb83eb78ebabce7754c2642eae67.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 3523⤵
- Program crash
PID:4128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 7683⤵
- Program crash
PID:1328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 7883⤵
- Program crash
PID:1824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 7963⤵
- Program crash
PID:1416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 7763⤵
- Program crash
PID:3216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 8243⤵
- Program crash
PID:3272
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 2856 -ip 28561⤵PID:784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3052 -ip 30521⤵PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3052 -ip 30521⤵PID:2720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3052 -ip 30521⤵PID:4468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3052 -ip 30521⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3052 -ip 30521⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3052 -ip 30521⤵PID:2456
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
832KB
MD5cf0053e57fe745d245e5fed87c8f16e3
SHA1c41fa8e2459ec31cd89e5bfb2f0d6a8c7672c7c2
SHA25621de8ca0192049930ab576e993a08302db9b62ec200aab0093a062370df459e1
SHA512c0c32297d5a6772820cb472c8b77645d5c13327fe1d8d8c55bf965d56f6154e1767cccb5f06aab8af4c8ecf9ee2323aaeea17de94fd4aca88754359fc73b4053