Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
49a3d0b26fc91931ce43fc2fc51fe220N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
49a3d0b26fc91931ce43fc2fc51fe220N.exe
Resource
win10v2004-20240709-en
General
-
Target
49a3d0b26fc91931ce43fc2fc51fe220N.exe
-
Size
272KB
-
MD5
49a3d0b26fc91931ce43fc2fc51fe220
-
SHA1
2c3256237579c77c1c7b34faeb4db048e70e7f94
-
SHA256
be9c4ad379e677f95ef9c90b564662a2114864d64633b16f9bcc6c25f906d00b
-
SHA512
2dfacf0a0c69d7dcc9dc1c579be45891e6a981d49aad6ce42257ac39ffefbc1df56853980715811f11a94a6236b4ccaee8a3a839f80f3cf9c3d58c7b5d4cdfa9
-
SSDEEP
6144:mh+aGE8hUa0uNVQ7mfNPc1T9nHw+9yy6atBWOw:PFNVzPc1T9n/97tA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2868 49a3d0b26fc91931ce43fc2fc51fe220N.exe -
Executes dropped EXE 1 IoCs
pid Process 2868 49a3d0b26fc91931ce43fc2fc51fe220N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1568 4424 WerFault.exe 83 408 2868 WerFault.exe 91 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4424 49a3d0b26fc91931ce43fc2fc51fe220N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2868 49a3d0b26fc91931ce43fc2fc51fe220N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4424 wrote to memory of 2868 4424 49a3d0b26fc91931ce43fc2fc51fe220N.exe 91 PID 4424 wrote to memory of 2868 4424 49a3d0b26fc91931ce43fc2fc51fe220N.exe 91 PID 4424 wrote to memory of 2868 4424 49a3d0b26fc91931ce43fc2fc51fe220N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\49a3d0b26fc91931ce43fc2fc51fe220N.exe"C:\Users\Admin\AppData\Local\Temp\49a3d0b26fc91931ce43fc2fc51fe220N.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 3962⤵
- Program crash
PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\49a3d0b26fc91931ce43fc2fc51fe220N.exeC:\Users\Admin\AppData\Local\Temp\49a3d0b26fc91931ce43fc2fc51fe220N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 3643⤵
- Program crash
PID:408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4424 -ip 44241⤵PID:4248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2868 -ip 28681⤵PID:2036
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD5fc0751190c47bebe3c9a49ef906d663c
SHA1b1e1f84e35db47cf7b28d208d94cd057b081277d
SHA256534dd29aef1a34f84271890b3b203bd6b0c68faa5a0a9978e0686bed87a8f3d5
SHA51264ce82d4eba14d8812d6d1d8b8b365f4f9b9de995065755549c5fd58e0c3a8cdd59cf399e3b8ccbcc11b4d9db107a57dc3d1a095464cbe4b1d9f04c402940b3c