Analysis
-
max time kernel
104s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 19:08
Behavioral task
behavioral1
Sample
efb0c5aa5b5273176f7f41054f622380N.exe
Resource
win7-20240708-en
General
-
Target
efb0c5aa5b5273176f7f41054f622380N.exe
-
Size
508KB
-
MD5
efb0c5aa5b5273176f7f41054f622380
-
SHA1
04618613ca757544da4ca71e073d43867689304b
-
SHA256
ae0fb0cb24696eb2b1f11ee00f7cad4b8bda35f8e6172511785aef132f6322d6
-
SHA512
d790a7f8b6405f58d6620018b5c5704ad6c30aa0cc9c522c627033f1741d3bbaef57d688aea2688f9b914bb952a0f65e2509aecffda428a9a439409b5422fe65
-
SSDEEP
12288:ChL7TwSoeD2Rt3knwbsKt4tj+xtrYxCQH:Cd7T6eTItrYFH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4012 efb0c5aa5b5273176f7f41054f622380N.exe -
Executes dropped EXE 1 IoCs
pid Process 4012 efb0c5aa5b5273176f7f41054f622380N.exe -
resource yara_rule behavioral2/memory/4064-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/files/0x000800000002346b-12.dat upx behavioral2/memory/4012-14-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 15 pastebin.com -
Program crash 19 IoCs
pid pid_target Process procid_target 3240 4012 WerFault.exe 85 2120 4012 WerFault.exe 85 2828 4012 WerFault.exe 85 3472 4012 WerFault.exe 85 3712 4012 WerFault.exe 85 3408 4012 WerFault.exe 85 1740 4012 WerFault.exe 85 4912 4012 WerFault.exe 85 2380 4012 WerFault.exe 85 1924 4012 WerFault.exe 85 2312 4012 WerFault.exe 85 4876 4012 WerFault.exe 85 1464 4012 WerFault.exe 85 1364 4012 WerFault.exe 85 4956 4012 WerFault.exe 85 4060 4012 WerFault.exe 85 3620 4012 WerFault.exe 85 1764 4012 WerFault.exe 85 5076 4012 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efb0c5aa5b5273176f7f41054f622380N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efb0c5aa5b5273176f7f41054f622380N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4916 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4064 efb0c5aa5b5273176f7f41054f622380N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4064 efb0c5aa5b5273176f7f41054f622380N.exe 4012 efb0c5aa5b5273176f7f41054f622380N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4064 wrote to memory of 4012 4064 efb0c5aa5b5273176f7f41054f622380N.exe 85 PID 4064 wrote to memory of 4012 4064 efb0c5aa5b5273176f7f41054f622380N.exe 85 PID 4064 wrote to memory of 4012 4064 efb0c5aa5b5273176f7f41054f622380N.exe 85 PID 4012 wrote to memory of 4916 4012 efb0c5aa5b5273176f7f41054f622380N.exe 86 PID 4012 wrote to memory of 4916 4012 efb0c5aa5b5273176f7f41054f622380N.exe 86 PID 4012 wrote to memory of 4916 4012 efb0c5aa5b5273176f7f41054f622380N.exe 86 PID 4012 wrote to memory of 3748 4012 efb0c5aa5b5273176f7f41054f622380N.exe 88 PID 4012 wrote to memory of 3748 4012 efb0c5aa5b5273176f7f41054f622380N.exe 88 PID 4012 wrote to memory of 3748 4012 efb0c5aa5b5273176f7f41054f622380N.exe 88 PID 3748 wrote to memory of 1916 3748 cmd.exe 90 PID 3748 wrote to memory of 1916 3748 cmd.exe 90 PID 3748 wrote to memory of 1916 3748 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\efb0c5aa5b5273176f7f41054f622380N.exe"C:\Users\Admin\AppData\Local\Temp\efb0c5aa5b5273176f7f41054f622380N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\efb0c5aa5b5273176f7f41054f622380N.exeC:\Users\Admin\AppData\Local\Temp\efb0c5aa5b5273176f7f41054f622380N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\efb0c5aa5b5273176f7f41054f622380N.exe" /TN RYTvY5fia886 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4916
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN RYTvY5fia886 > C:\Users\Admin\AppData\Local\Temp\DxHz6.xml3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN RYTvY5fia8864⤵
- System Location Discovery: System Language Discovery
PID:1916
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 5643⤵
- Program crash
PID:3240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 6483⤵
- Program crash
PID:2120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 7243⤵
- Program crash
PID:2828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 7443⤵
- Program crash
PID:3472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 7123⤵
- Program crash
PID:3712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 7963⤵
- Program crash
PID:3408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 15003⤵
- Program crash
PID:1740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 13963⤵
- Program crash
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 17443⤵
- Program crash
PID:2380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 13763⤵
- Program crash
PID:1924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 17523⤵
- Program crash
PID:2312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 17123⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 15723⤵
- Program crash
PID:1464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 12643⤵
- Program crash
PID:1364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 17443⤵
- Program crash
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 17563⤵
- Program crash
PID:4060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 17923⤵
- Program crash
PID:3620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 12643⤵
- Program crash
PID:1764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 17083⤵
- Program crash
PID:5076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4012 -ip 40121⤵PID:412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4012 -ip 40121⤵PID:3868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4012 -ip 40121⤵PID:1556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4012 -ip 40121⤵PID:3008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4012 -ip 40121⤵PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4012 -ip 40121⤵PID:3564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4012 -ip 40121⤵PID:1496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4012 -ip 40121⤵PID:1832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4012 -ip 40121⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4012 -ip 40121⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4012 -ip 40121⤵PID:872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4012 -ip 40121⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4012 -ip 40121⤵PID:832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4012 -ip 40121⤵PID:2468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4012 -ip 40121⤵PID:4884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4012 -ip 40121⤵PID:1916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4012 -ip 40121⤵PID:4128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4012 -ip 40121⤵PID:1952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4012 -ip 40121⤵PID:4688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD521b8ec53d36cbe7e3766a150a31d67db
SHA197add91928d574b7e00a26e6f6b29ae2153b2f0b
SHA2566c68c72aeaceefb119e15acd1f7113dd5f09c50290c913e96048eba34ef8caa7
SHA512056928b71bab0c1eb845d2c3236124ec133b9025547a019734e145c0f4998b1dc0d07a4e2f9f45da5101829ad0721f047d8a27eb4c34dcc79260b8797a1dc2d6
-
Filesize
508KB
MD540a2b5f70f52c787299ba5f7fb092c79
SHA1f0231892edf97410e4b15b0107d83a4bf256349a
SHA256447046276f0597c76477ecfc30c941619ba7c8db23910393da1a97de5f304207
SHA512f62e8e9ebb312135513810878f4e20e7279c9de5e9fd902841f7aa8b7450ce89744792a6585dc5012c18db25aaca187de65abfbff7b86b05bd7051b249faf31f