Analysis

  • max time kernel
    124s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2024, 02:20

General

  • Target

    d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe

  • Size

    4.3MB

  • MD5

    b9f406032b5c5cad589b358eaf0da8da

  • SHA1

    441f2d5d112ae528eaaff43dab03302bba26c248

  • SHA256

    d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9

  • SHA512

    242ff83a379a796e5f6f5dca07f368a19efdbbcedcefbd2c76124836f375b8fbd8a7560b00366ff40c64ef4247e59d7857839a82b4173abbe43831186725709e

  • SSDEEP

    49152:mimARhgZiXwwyy7Bu9+8gTg4khbNsm+kCjmCX5yvpnr5jtIgygRbNsm+SXuI:4AXwwxkhZshnvs5rfZshSXuI

Score
9/10

Malware Config

Signatures

  • Detects executables (downlaoders) containing URLs to raw contents of a paste 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Program crash 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe
    "C:\Users\Admin\AppData\Local\Temp\d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 344
      2⤵
      • Program crash
      PID:980
    • C:\Users\Admin\AppData\Local\Temp\d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe
      C:\Users\Admin\AppData\Local\Temp\d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      PID:920
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 344
        3⤵
        • Program crash
        PID:4512
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 628
        3⤵
        • Program crash
        PID:4940
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 636
        3⤵
        • Program crash
        PID:2696
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 684
        3⤵
        • Program crash
        PID:1404
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 696
        3⤵
        • Program crash
        PID:5112
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 888
        3⤵
        • Program crash
        PID:5028
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 1396
        3⤵
        • Program crash
        PID:4568
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 1396
        3⤵
        • Program crash
        PID:4176
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 1504
        3⤵
        • Program crash
        PID:4740
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 1652
        3⤵
        • Program crash
        PID:4184
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 1664
        3⤵
        • Program crash
        PID:1964
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 984
        3⤵
        • Program crash
        PID:4152
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4616 -ip 4616
    1⤵
      PID:4644
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 920 -ip 920
      1⤵
        PID:4424
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 920 -ip 920
        1⤵
          PID:3556
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 920 -ip 920
          1⤵
            PID:3636
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 920 -ip 920
            1⤵
              PID:5108
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 920 -ip 920
              1⤵
                PID:4068
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 920 -ip 920
                1⤵
                  PID:3952
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 920 -ip 920
                  1⤵
                    PID:532
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 920 -ip 920
                    1⤵
                      PID:4656
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 920 -ip 920
                      1⤵
                        PID:3512
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 920 -ip 920
                        1⤵
                          PID:2100
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 920 -ip 920
                          1⤵
                            PID:4676
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 920 -ip 920
                            1⤵
                              PID:2020

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe

                              Filesize

                              4.3MB

                              MD5

                              b70838d44a9aacf92e9c26773f5a6606

                              SHA1

                              613b690d98844e385acb9a553863734ac80f29e4

                              SHA256

                              9bbe09e06de807bcd9afb84e06321640c0e25a5b2cb70819b9addb1d03c3b847

                              SHA512

                              0cf08dd758f4ebaab095d07be7db4a30cfc603dd36f5b7274c246f6f636d86346f7d20dc54f8a0c68b98501aac3f10700eb3314f0495c50cd2e079bd35c7d6d2

                            • memory/920-7-0x0000000000400000-0x0000000000517000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/920-8-0x0000000000400000-0x00000000004A3000-memory.dmp

                              Filesize

                              652KB

                            • memory/920-11-0x0000000005150000-0x0000000005267000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/920-20-0x0000000000400000-0x0000000000443000-memory.dmp

                              Filesize

                              268KB

                            • memory/920-26-0x000000000BA00000-0x000000000BAA3000-memory.dmp

                              Filesize

                              652KB

                            • memory/4616-0-0x0000000000400000-0x0000000000517000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/4616-6-0x0000000000400000-0x0000000000517000-memory.dmp

                              Filesize

                              1.1MB