Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
b9e4ff7a7b7427febe6c667e5efd860a8ae6c2f326f90171646029cff6a87160.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b9e4ff7a7b7427febe6c667e5efd860a8ae6c2f326f90171646029cff6a87160.exe
Resource
win10v2004-20240704-en
General
-
Target
b9e4ff7a7b7427febe6c667e5efd860a8ae6c2f326f90171646029cff6a87160.exe
-
Size
448KB
-
MD5
7a056da6f00634b3975fed6b5dcb777a
-
SHA1
21820edcb6f568ad60ccd64f7bbfa23b4828f1a5
-
SHA256
b9e4ff7a7b7427febe6c667e5efd860a8ae6c2f326f90171646029cff6a87160
-
SHA512
bdf11d79cae3de1eeed235c4d0c545dc65f7707db0c8e7a56fc09a147e41a51fba8da72bac95828d2f4abf0f22f80ecac0f41820c018640b79ea9e1ddf6c018b
-
SSDEEP
12288:31YOvfaEuvP0gXCi5zVejWhVQ5zCD4TyWN4:31YOvfaEuvP0gXCi5zsjWhVQ5zY4xN4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2656 b9e4ff7a7b7427febe6c667e5efd860a8ae6c2f326f90171646029cff6a87160.exe -
Executes dropped EXE 1 IoCs
pid Process 2656 b9e4ff7a7b7427febe6c667e5efd860a8ae6c2f326f90171646029cff6a87160.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1828 2284 WerFault.exe 81 1364 2656 WerFault.exe 89 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2284 b9e4ff7a7b7427febe6c667e5efd860a8ae6c2f326f90171646029cff6a87160.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2656 b9e4ff7a7b7427febe6c667e5efd860a8ae6c2f326f90171646029cff6a87160.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2656 2284 b9e4ff7a7b7427febe6c667e5efd860a8ae6c2f326f90171646029cff6a87160.exe 89 PID 2284 wrote to memory of 2656 2284 b9e4ff7a7b7427febe6c667e5efd860a8ae6c2f326f90171646029cff6a87160.exe 89 PID 2284 wrote to memory of 2656 2284 b9e4ff7a7b7427febe6c667e5efd860a8ae6c2f326f90171646029cff6a87160.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9e4ff7a7b7427febe6c667e5efd860a8ae6c2f326f90171646029cff6a87160.exe"C:\Users\Admin\AppData\Local\Temp\b9e4ff7a7b7427febe6c667e5efd860a8ae6c2f326f90171646029cff6a87160.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 3962⤵
- Program crash
PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\b9e4ff7a7b7427febe6c667e5efd860a8ae6c2f326f90171646029cff6a87160.exeC:\Users\Admin\AppData\Local\Temp\b9e4ff7a7b7427febe6c667e5efd860a8ae6c2f326f90171646029cff6a87160.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 3683⤵
- Program crash
PID:1364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2284 -ip 22841⤵PID:2780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2656 -ip 26561⤵PID:2928
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\b9e4ff7a7b7427febe6c667e5efd860a8ae6c2f326f90171646029cff6a87160.exe
Filesize448KB
MD55d61d1f67eebe604b341819d43de8b9a
SHA1bde8b525adb782313d3f7548c2c3103ec5ce420e
SHA2561f7fd14e06e09ebd070f64b2545f7b0ba543363369b5072524aae05142d8ee83
SHA512f76a003f0795c646722b1ecba739459d99fa37567b2a5a614d530772ef1254024f2b5f9a24e2f9d0b33ec074e0931684a00f737c57b62a9bd7989eb20f89df0d