Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
78f9d94d095bf829499d19dada8b637e35cb84ff69aa23212c0c264d0dc079d8.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
78f9d94d095bf829499d19dada8b637e35cb84ff69aa23212c0c264d0dc079d8.exe
Resource
win10v2004-20240226-en
General
-
Target
78f9d94d095bf829499d19dada8b637e35cb84ff69aa23212c0c264d0dc079d8.exe
-
Size
416KB
-
MD5
c7b466a7928c9bf56952b444c477e7c9
-
SHA1
515dc7b51abd7c3c2963058bc6c5d5bb4b912bfa
-
SHA256
78f9d94d095bf829499d19dada8b637e35cb84ff69aa23212c0c264d0dc079d8
-
SHA512
e171c198ce126f461fb8fd038d1f4b43cf60d2ebadc5387299793fb39f907da1b7196ae9ce6a6a0fbfa0517767957f8273607518dfc61f15d38e271a5a063c27
-
SSDEEP
6144:XqWAAH+Om79H0W7cyqCxSngmMBqfycuPbUl0i5cD5J6KE:XqW9H+Om7j0npM4dl0v5JdE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 116 78f9d94d095bf829499d19dada8b637e35cb84ff69aa23212c0c264d0dc079d8.exe -
Executes dropped EXE 1 IoCs
pid Process 116 78f9d94d095bf829499d19dada8b637e35cb84ff69aa23212c0c264d0dc079d8.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 444 4544 WerFault.exe 90 3692 116 WerFault.exe 94 3688 116 WerFault.exe 94 4248 116 WerFault.exe 94 3768 116 WerFault.exe 94 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4544 78f9d94d095bf829499d19dada8b637e35cb84ff69aa23212c0c264d0dc079d8.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 116 78f9d94d095bf829499d19dada8b637e35cb84ff69aa23212c0c264d0dc079d8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4544 wrote to memory of 116 4544 78f9d94d095bf829499d19dada8b637e35cb84ff69aa23212c0c264d0dc079d8.exe 94 PID 4544 wrote to memory of 116 4544 78f9d94d095bf829499d19dada8b637e35cb84ff69aa23212c0c264d0dc079d8.exe 94 PID 4544 wrote to memory of 116 4544 78f9d94d095bf829499d19dada8b637e35cb84ff69aa23212c0c264d0dc079d8.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\78f9d94d095bf829499d19dada8b637e35cb84ff69aa23212c0c264d0dc079d8.exe"C:\Users\Admin\AppData\Local\Temp\78f9d94d095bf829499d19dada8b637e35cb84ff69aa23212c0c264d0dc079d8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 3842⤵
- Program crash
PID:444
-
-
C:\Users\Admin\AppData\Local\Temp\78f9d94d095bf829499d19dada8b637e35cb84ff69aa23212c0c264d0dc079d8.exeC:\Users\Admin\AppData\Local\Temp\78f9d94d095bf829499d19dada8b637e35cb84ff69aa23212c0c264d0dc079d8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 3523⤵
- Program crash
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 7683⤵
- Program crash
PID:3688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 7723⤵
- Program crash
PID:4248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 7923⤵
- Program crash
PID:3768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4544 -ip 45441⤵PID:3600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 116 -ip 1161⤵PID:1308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 116 -ip 1161⤵PID:1968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 116 -ip 1161⤵PID:4596
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 116 -ip 1161⤵PID:2892
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\78f9d94d095bf829499d19dada8b637e35cb84ff69aa23212c0c264d0dc079d8.exe
Filesize416KB
MD5bdf3760c1b2feeb7980f2592f34627eb
SHA16f334ca9deb3320a13b5479726e5b40a4b5e7244
SHA2568355faac12a5015835f13ab0a84899f8798ff103e45fb3d1ccbe08cb32eea517
SHA5127a3bda8d2c6a14a3c62fa7abe41e6685e47ac59fd19dea6cd2b66440e9b37b518923a3001a1a2611c491e7da767f5574011397152f11132b4e64d704c3b63b02