Analysis

  • max time kernel
    92s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 00:28

General

  • Target

    fc7ebb238c545e25fd2ef3af7cb507e6f2ca0fba89951669346f7df53f288f6b.exe

  • Size

    194KB

  • MD5

    a55ecb85fe9d5e92672803278ba89625

  • SHA1

    8aea90ef1d0f99111398802e8a1e2bdfd0ddf0f6

  • SHA256

    fc7ebb238c545e25fd2ef3af7cb507e6f2ca0fba89951669346f7df53f288f6b

  • SHA512

    c01c7796169dfc10bd7302caddb91e109865b32481ec28143aece89af71c3c2e1b7fd670400482a7f7da5fcce50f77c0f7790baa849028f832e1ade8b0c5bfaf

  • SSDEEP

    3072:5S0scglOCcofiFlrquT0yNm0ozYSsa5bfzfB029sSJx/0vMLy3SyMhP8:5PecMyquo2ozYSsoP+29sSJSen

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc7ebb238c545e25fd2ef3af7cb507e6f2ca0fba89951669346f7df53f288f6b.exe
    "C:\Users\Admin\AppData\Local\Temp\fc7ebb238c545e25fd2ef3af7cb507e6f2ca0fba89951669346f7df53f288f6b.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3268
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 428
      2⤵
      • Program crash
      PID:4920
    • C:\Users\Admin\AppData\Local\Temp\fc7ebb238c545e25fd2ef3af7cb507e6f2ca0fba89951669346f7df53f288f6b.exe
      C:\Users\Admin\AppData\Local\Temp\fc7ebb238c545e25fd2ef3af7cb507e6f2ca0fba89951669346f7df53f288f6b.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2464
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 392
        3⤵
        • Program crash
        PID:3180
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3268 -ip 3268
    1⤵
      PID:1540
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2464 -ip 2464
      1⤵
        PID:640

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\fc7ebb238c545e25fd2ef3af7cb507e6f2ca0fba89951669346f7df53f288f6b.exe

        Filesize

        194KB

        MD5

        39feac2dafa0b86a36afffaf4f7d4430

        SHA1

        7d3f4a0dc4faf180d95561ecb94e778b9fed4d9b

        SHA256

        a0899a29c3060821e8c1b165098ca901795584ce5ce2ef6e297c5b1d25ce56be

        SHA512

        770ce44d8000d5ba4b381c6870d1422f28b4e43a0efa748e31547008f43cdd422b5192aecb89379253ac1814f751133ca94f0d82429ba8787507a1cdf5451de1

      • memory/2464-7-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/2464-8-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2464-9-0x0000000001640000-0x0000000001679000-memory.dmp

        Filesize

        228KB

      • memory/3268-0-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/3268-6-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB