Analysis
-
max time kernel
93s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe
Resource
win10v2004-20240704-en
General
-
Target
0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe
-
Size
448KB
-
MD5
8c23d4da041648056f2aeef1d3821fc0
-
SHA1
ed33789d1d2fe0ad940caf58b89179b04cbe2d4a
-
SHA256
0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743
-
SHA512
3dd1499a2677c385f3baea68c4058a4c66927debacb10b5d569589ff59c45552cb6761265092b2c42f24371f6e05c5e62593945c8d080d561a2859d4a1a7671a
-
SSDEEP
6144:5LiHv5tgNOZUVVCf8OoI82wwiWhV40saiigCD4H2cHwXWNzDw:585JZU/aoIfwPWhVQ5zCD4TyWN4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3380 0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe -
Executes dropped EXE 1 IoCs
pid Process 3380 0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3060 960 WerFault.exe 79 3524 3380 WerFault.exe 87 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 960 0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3380 0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 960 wrote to memory of 3380 960 0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe 87 PID 960 wrote to memory of 3380 960 0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe 87 PID 960 wrote to memory of 3380 960 0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe"C:\Users\Admin\AppData\Local\Temp\0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 960 -s 3962⤵
- Program crash
PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exeC:\Users\Admin\AppData\Local\Temp\0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 3643⤵
- Program crash
PID:3524
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 960 -ip 9601⤵PID:3084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3380 -ip 33801⤵PID:4316
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0e7460d5c785cf47ec4746f1045e9dfac4b038703549635ad71bf4e7800e2743.exe
Filesize448KB
MD5a4b23c7b9383904fa4781a61549b35cf
SHA18e92dada266effe30c6e52882c2a04754568e37b
SHA256140a2b60731d5724f77117ac9728c0481ad08df4619ae986a6f3010f7e126b6d
SHA512258eadaa79588f9cf1e3b5b86da2211a20d56eccd2adee0e9b9a1e2ddea0fdadd35a33a09314a15da4fe918b4992b2f80c0818aebe8a17cdfa2ff9f94b6c5ad8