Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
0684f33de1d13b5d82748f0f33438a83.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0684f33de1d13b5d82748f0f33438a83.exe
Resource
win10v2004-20240226-en
General
-
Target
0684f33de1d13b5d82748f0f33438a83.exe
-
Size
205KB
-
MD5
0684f33de1d13b5d82748f0f33438a83
-
SHA1
311f97541d8ba97dffa0b3a9ab5b0acda1c53cce
-
SHA256
818912122394ebdf2e59fe66fe1c7f314f5d4206a3770f8495dcbb6b5e3c496f
-
SHA512
6b1821d39256cfe24b0c148d84e62fa77a356f047e8b59c05feca6c6aef4581cb0d63c7f16a8cb8f05ffb4e9257c85f7df217ca45bf6a83de6815fd8f78f2470
-
SSDEEP
6144:r5ej8IqjDqC4hV56KmO1Drzh+eHMCkP79W:YPqjXU1Drt+pCa74
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3412 0684f33de1d13b5d82748f0f33438a83.exe -
Executes dropped EXE 1 IoCs
pid Process 3412 0684f33de1d13b5d82748f0f33438a83.exe -
Program crash 7 IoCs
pid pid_target Process procid_target 3992 4240 WerFault.exe 83 1428 3412 WerFault.exe 90 3904 3412 WerFault.exe 90 2976 3412 WerFault.exe 90 1044 3412 WerFault.exe 90 4488 3412 WerFault.exe 90 208 3412 WerFault.exe 90 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4240 0684f33de1d13b5d82748f0f33438a83.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3412 0684f33de1d13b5d82748f0f33438a83.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4240 wrote to memory of 3412 4240 0684f33de1d13b5d82748f0f33438a83.exe 90 PID 4240 wrote to memory of 3412 4240 0684f33de1d13b5d82748f0f33438a83.exe 90 PID 4240 wrote to memory of 3412 4240 0684f33de1d13b5d82748f0f33438a83.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0684f33de1d13b5d82748f0f33438a83.exe"C:\Users\Admin\AppData\Local\Temp\0684f33de1d13b5d82748f0f33438a83.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 3842⤵
- Program crash
PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\0684f33de1d13b5d82748f0f33438a83.exeC:\Users\Admin\AppData\Local\Temp\0684f33de1d13b5d82748f0f33438a83.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 3603⤵
- Program crash
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 7683⤵
- Program crash
PID:3904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 8083⤵
- Program crash
PID:2976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 7763⤵
- Program crash
PID:1044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 8163⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 8243⤵
- Program crash
PID:208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4240 -ip 42401⤵PID:3416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3412 -ip 34121⤵PID:832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3412 -ip 34121⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3412 -ip 34121⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3412 -ip 34121⤵PID:2012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3412 -ip 34121⤵PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3412 -ip 34121⤵PID:1524
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5565bec09a0706c5e003477209a87e2fc
SHA18f0cb17c03aa5c87d4196740ba67ff25fc3dcdf3
SHA256173c6804f71241ac7ad9b85ba77de55db546418454e353e8775e225a52a8a891
SHA51227fdf01afa7829c7616ae1fb6d30d72248f8816a727f48c507c65835e6d39ea0dfbac83ef2ccb6c8b04ef2b45ecfe4d8dae9525f339ca856ab97fef5b6345179