Analysis
-
max time kernel
94s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
886f0f0a61db6d2280c1114151eadcd4bcc027b2160816b16b3463823723a12d.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
886f0f0a61db6d2280c1114151eadcd4bcc027b2160816b16b3463823723a12d.exe
Resource
win10v2004-20240704-en
General
-
Target
886f0f0a61db6d2280c1114151eadcd4bcc027b2160816b16b3463823723a12d.exe
-
Size
4.1MB
-
MD5
2f17cd9caad32ffafa98c7f44a5ca2d5
-
SHA1
318b333167cbe77654444d91cad0ea08a88e013e
-
SHA256
886f0f0a61db6d2280c1114151eadcd4bcc027b2160816b16b3463823723a12d
-
SHA512
53def71aaaddcfe6acfc366beae823a3688554210659b7f1febae0206f004d1ca47034055664fef206191d72a10924532bd11c36f6499a95f7c23446740e9700
-
SSDEEP
24576:VpDpUuGeXVva/ZSVDbue+zxa/ZSrJovBYTqT2RUOa/ZSAajJBMqAX1Ea/ZSOue+l:VpDpUupVvg6n8xgClgCo/ugDw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5032 886f0f0a61db6d2280c1114151eadcd4bcc027b2160816b16b3463823723a12d.exe -
Executes dropped EXE 1 IoCs
pid Process 5032 886f0f0a61db6d2280c1114151eadcd4bcc027b2160816b16b3463823723a12d.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 608 2804 WerFault.exe 81 1776 5032 WerFault.exe 89 5076 5032 WerFault.exe 89 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2804 886f0f0a61db6d2280c1114151eadcd4bcc027b2160816b16b3463823723a12d.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 5032 886f0f0a61db6d2280c1114151eadcd4bcc027b2160816b16b3463823723a12d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2804 wrote to memory of 5032 2804 886f0f0a61db6d2280c1114151eadcd4bcc027b2160816b16b3463823723a12d.exe 89 PID 2804 wrote to memory of 5032 2804 886f0f0a61db6d2280c1114151eadcd4bcc027b2160816b16b3463823723a12d.exe 89 PID 2804 wrote to memory of 5032 2804 886f0f0a61db6d2280c1114151eadcd4bcc027b2160816b16b3463823723a12d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\886f0f0a61db6d2280c1114151eadcd4bcc027b2160816b16b3463823723a12d.exe"C:\Users\Admin\AppData\Local\Temp\886f0f0a61db6d2280c1114151eadcd4bcc027b2160816b16b3463823723a12d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 3442⤵
- Program crash
PID:608
-
-
C:\Users\Admin\AppData\Local\Temp\886f0f0a61db6d2280c1114151eadcd4bcc027b2160816b16b3463823723a12d.exeC:\Users\Admin\AppData\Local\Temp\886f0f0a61db6d2280c1114151eadcd4bcc027b2160816b16b3463823723a12d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 3443⤵
- Program crash
PID:1776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 3443⤵
- Program crash
PID:5076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2804 -ip 28041⤵PID:3524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5032 -ip 50321⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5032 -ip 50321⤵PID:4872
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\886f0f0a61db6d2280c1114151eadcd4bcc027b2160816b16b3463823723a12d.exe
Filesize4.1MB
MD5a9413f407c733a0b4debaa7fbb41f18f
SHA18fc2a7b91bcb90f790af4a5c998f16dde25589e8
SHA2564208e4e6a550243c4eaedebe3c94fa5e56bf181cbe25b58215b080d6377f5eab
SHA51215bdf3f0a1a6dec14d44127fc7a49b6a1e3d4e50437b1d0adc2fd07fa92e19d5b60bdd8e61397e71c35144b7c1f55bfbc3165271ebf220159ad0dc6eb22f8bfd