Analysis
-
max time kernel
102s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
a1d1f8bef1fbd0d181295a3b804a2c30N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a1d1f8bef1fbd0d181295a3b804a2c30N.exe
Resource
win10v2004-20240802-en
General
-
Target
a1d1f8bef1fbd0d181295a3b804a2c30N.exe
-
Size
1.4MB
-
MD5
a1d1f8bef1fbd0d181295a3b804a2c30
-
SHA1
be5c8c98517770065b6b0051d55ed2762a3d9f70
-
SHA256
fc92d3d8f7e2fbe4fb3c383f2356e4be26b1e25d56c055063f8a3749d3aac85f
-
SHA512
aca3c03e431c6516075c55bc954c14e60d961aecbbc9882e74a624b824170479926745414f6f61f2f99a08b3ed732ccd1882669a0e250f1febde570f48b855f0
-
SSDEEP
24576:tOdwVp+OzfQUbTbJGAuYiXFUdPCFsbO3a/ZS1iT77Lv+f6T8Qnskb2i6OBKaBuL:Eap+Onb85YiXFUCFsbagsiTbq4TTC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3684 a1d1f8bef1fbd0d181295a3b804a2c30N.exe -
Executes dropped EXE 1 IoCs
pid Process 3684 a1d1f8bef1fbd0d181295a3b804a2c30N.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 pastebin.com 21 pastebin.com -
Program crash 14 IoCs
pid pid_target Process procid_target 1824 1772 WerFault.exe 83 4204 3684 WerFault.exe 91 64 3684 WerFault.exe 91 3048 3684 WerFault.exe 91 832 3684 WerFault.exe 91 472 3684 WerFault.exe 91 1464 3684 WerFault.exe 91 4332 3684 WerFault.exe 91 456 3684 WerFault.exe 91 4064 3684 WerFault.exe 91 1176 3684 WerFault.exe 91 1640 3684 WerFault.exe 91 2124 3684 WerFault.exe 91 4076 3684 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1d1f8bef1fbd0d181295a3b804a2c30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1d1f8bef1fbd0d181295a3b804a2c30N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3684 a1d1f8bef1fbd0d181295a3b804a2c30N.exe 3684 a1d1f8bef1fbd0d181295a3b804a2c30N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1772 a1d1f8bef1fbd0d181295a3b804a2c30N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3684 a1d1f8bef1fbd0d181295a3b804a2c30N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1772 wrote to memory of 3684 1772 a1d1f8bef1fbd0d181295a3b804a2c30N.exe 91 PID 1772 wrote to memory of 3684 1772 a1d1f8bef1fbd0d181295a3b804a2c30N.exe 91 PID 1772 wrote to memory of 3684 1772 a1d1f8bef1fbd0d181295a3b804a2c30N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1d1f8bef1fbd0d181295a3b804a2c30N.exe"C:\Users\Admin\AppData\Local\Temp\a1d1f8bef1fbd0d181295a3b804a2c30N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 3442⤵
- Program crash
PID:1824
-
-
C:\Users\Admin\AppData\Local\Temp\a1d1f8bef1fbd0d181295a3b804a2c30N.exeC:\Users\Admin\AppData\Local\Temp\a1d1f8bef1fbd0d181295a3b804a2c30N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:3684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 3443⤵
- Program crash
PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 6163⤵
- Program crash
PID:64
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 6363⤵
- Program crash
PID:3048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 7003⤵
- Program crash
PID:832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 7603⤵
- Program crash
PID:472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 8923⤵
- Program crash
PID:1464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 14043⤵
- Program crash
PID:4332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 14123⤵
- Program crash
PID:456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 14923⤵
- Program crash
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 14643⤵
- Program crash
PID:1176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 16483⤵
- Program crash
PID:1640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 14843⤵
- Program crash
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 16403⤵
- Program crash
PID:4076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1772 -ip 17721⤵PID:3104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3684 -ip 36841⤵PID:1720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3684 -ip 36841⤵PID:3640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3684 -ip 36841⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3684 -ip 36841⤵PID:2728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3684 -ip 36841⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3684 -ip 36841⤵PID:756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3684 -ip 36841⤵PID:2920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3684 -ip 36841⤵PID:1768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3684 -ip 36841⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3684 -ip 36841⤵PID:1872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3684 -ip 36841⤵PID:4208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3684 -ip 36841⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3684 -ip 36841⤵PID:4460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD58d1391b2c95238a042c935d8a08a3ad9
SHA1dfc0f703159a8642657eb8338cbaeeec60ca0685
SHA2564ffb2216a8564c6808a7e4ee8c08633ef116d6faf7a19e69f2576f39cd07c2ba
SHA512ef1a43ca3181fe72648c7635bbbd8c25649d3f2357a0114b9fdf4e99e74a82ae5482e55290cdce8da3a851eb69fd3b48f45742faeb4899773f3a7521cc554e06