Analysis
-
max time kernel
139s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
5f9fa0d9b3af6a41bc94db36debc148e80257f2fd2b980c49d6b7788d833711a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5f9fa0d9b3af6a41bc94db36debc148e80257f2fd2b980c49d6b7788d833711a.exe
Resource
win10v2004-20240412-en
General
-
Target
5f9fa0d9b3af6a41bc94db36debc148e80257f2fd2b980c49d6b7788d833711a.exe
-
Size
416KB
-
MD5
49a4b56aa5ae1e3d26eabbc7f50d94fd
-
SHA1
8af09cadb252df62186116304f137e3323f77ec1
-
SHA256
5f9fa0d9b3af6a41bc94db36debc148e80257f2fd2b980c49d6b7788d833711a
-
SHA512
79748f6f2153becf62debc96630dedf041c0d5cff6cd6461ae310fbe503027411f001fa7d1626703f939c31ea3d6eb18230843dbabef52a320955f501a38bd3b
-
SSDEEP
6144:sH/Vj4JJFNd5d79H0W7cyqCxSngmMBqfycuPbUl0i5cD5J6KE:4ibbd7j0npM4dl0v5JdE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4976 5f9fa0d9b3af6a41bc94db36debc148e80257f2fd2b980c49d6b7788d833711a.exe -
Executes dropped EXE 1 IoCs
pid Process 4976 5f9fa0d9b3af6a41bc94db36debc148e80257f2fd2b980c49d6b7788d833711a.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 2220 2648 WerFault.exe 86 4880 4976 WerFault.exe 93 3840 4976 WerFault.exe 93 1796 4976 WerFault.exe 93 2056 4976 WerFault.exe 93 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2648 5f9fa0d9b3af6a41bc94db36debc148e80257f2fd2b980c49d6b7788d833711a.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4976 5f9fa0d9b3af6a41bc94db36debc148e80257f2fd2b980c49d6b7788d833711a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2648 wrote to memory of 4976 2648 5f9fa0d9b3af6a41bc94db36debc148e80257f2fd2b980c49d6b7788d833711a.exe 93 PID 2648 wrote to memory of 4976 2648 5f9fa0d9b3af6a41bc94db36debc148e80257f2fd2b980c49d6b7788d833711a.exe 93 PID 2648 wrote to memory of 4976 2648 5f9fa0d9b3af6a41bc94db36debc148e80257f2fd2b980c49d6b7788d833711a.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f9fa0d9b3af6a41bc94db36debc148e80257f2fd2b980c49d6b7788d833711a.exe"C:\Users\Admin\AppData\Local\Temp\5f9fa0d9b3af6a41bc94db36debc148e80257f2fd2b980c49d6b7788d833711a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 3842⤵
- Program crash
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\5f9fa0d9b3af6a41bc94db36debc148e80257f2fd2b980c49d6b7788d833711a.exeC:\Users\Admin\AppData\Local\Temp\5f9fa0d9b3af6a41bc94db36debc148e80257f2fd2b980c49d6b7788d833711a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 3523⤵
- Program crash
PID:4880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 7683⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 7883⤵
- Program crash
PID:1796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 7963⤵
- Program crash
PID:2056
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2648 -ip 26481⤵PID:3192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4976 -ip 49761⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4976 -ip 49761⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4976 -ip 49761⤵PID:1488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4976 -ip 49761⤵PID:3128
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5f9fa0d9b3af6a41bc94db36debc148e80257f2fd2b980c49d6b7788d833711a.exe
Filesize416KB
MD582d697bc67961b7a3dc954ce658f62ff
SHA10e50fa0c94b3082d6005b9375f240402eb89fe90
SHA2567eea53ef96f045983092ff7f29d2a979e0b9de8ec238111dd13cfb3eaceb9b22
SHA51225ff1987f787304945e631513de2673688379e71378a0f887039bdd189013e9abff3e71e78d10ca24c9a1027c4c96e8e6ad79a643f9fcfd65989c13958b8bf1a