Analysis
-
max time kernel
124s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe
Resource
win10v2004-20240412-en
General
-
Target
d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe
-
Size
4.3MB
-
MD5
b9f406032b5c5cad589b358eaf0da8da
-
SHA1
441f2d5d112ae528eaaff43dab03302bba26c248
-
SHA256
d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9
-
SHA512
242ff83a379a796e5f6f5dca07f368a19efdbbcedcefbd2c76124836f375b8fbd8a7560b00366ff40c64ef4247e59d7857839a82b4173abbe43831186725709e
-
SSDEEP
49152:mimARhgZiXwwyy7Bu9+8gTg4khbNsm+kCjmCX5yvpnr5jtIgygRbNsm+SXuI:4AXwwxkhZshnvs5rfZshSXuI
Malware Config
Signatures
-
Detects executables (downlaoders) containing URLs to raw contents of a paste 2 IoCs
resource yara_rule behavioral2/memory/920-8-0x0000000000400000-0x00000000004A3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawPaste_URL behavioral2/memory/920-26-0x000000000BA00000-0x000000000BAA3000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawPaste_URL -
Deletes itself 1 IoCs
pid Process 920 d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe -
Executes dropped EXE 1 IoCs
pid Process 920 d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 2 pastebin.com -
Program crash 13 IoCs
pid pid_target Process procid_target 980 4616 WerFault.exe 79 4512 920 WerFault.exe 87 4940 920 WerFault.exe 87 2696 920 WerFault.exe 87 1404 920 WerFault.exe 87 5112 920 WerFault.exe 87 5028 920 WerFault.exe 87 4568 920 WerFault.exe 87 4176 920 WerFault.exe 87 4740 920 WerFault.exe 87 4184 920 WerFault.exe 87 1964 920 WerFault.exe 87 4152 920 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 920 d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe 920 d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4616 d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 920 d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4616 wrote to memory of 920 4616 d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe 87 PID 4616 wrote to memory of 920 4616 d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe 87 PID 4616 wrote to memory of 920 4616 d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe"C:\Users\Admin\AppData\Local\Temp\d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 3442⤵
- Program crash
PID:980
-
-
C:\Users\Admin\AppData\Local\Temp\d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exeC:\Users\Admin\AppData\Local\Temp\d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 3443⤵
- Program crash
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 6283⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 6363⤵
- Program crash
PID:2696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 6843⤵
- Program crash
PID:1404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 6963⤵
- Program crash
PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 8883⤵
- Program crash
PID:5028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 13963⤵
- Program crash
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 13963⤵
- Program crash
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 15043⤵
- Program crash
PID:4740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 16523⤵
- Program crash
PID:4184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 16643⤵
- Program crash
PID:1964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 9843⤵
- Program crash
PID:4152
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4616 -ip 46161⤵PID:4644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 920 -ip 9201⤵PID:4424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 920 -ip 9201⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 920 -ip 9201⤵PID:3636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 920 -ip 9201⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 920 -ip 9201⤵PID:4068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 920 -ip 9201⤵PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 920 -ip 9201⤵PID:532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 920 -ip 9201⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 920 -ip 9201⤵PID:3512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 920 -ip 9201⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 920 -ip 9201⤵PID:4676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 920 -ip 9201⤵PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\d0876a0f3a430e371e1df537d2e00fd16de01d6f64f5bc624660bd804aa164c9.exe
Filesize4.3MB
MD5b70838d44a9aacf92e9c26773f5a6606
SHA1613b690d98844e385acb9a553863734ac80f29e4
SHA2569bbe09e06de807bcd9afb84e06321640c0e25a5b2cb70819b9addb1d03c3b847
SHA5120cf08dd758f4ebaab095d07be7db4a30cfc603dd36f5b7274c246f6f636d86346f7d20dc54f8a0c68b98501aac3f10700eb3314f0495c50cd2e079bd35c7d6d2