Analysis
-
max time kernel
94s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 23:59
Behavioral task
behavioral1
Sample
bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe
Resource
win7-20240903-en
General
-
Target
bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe
-
Size
6.4MB
-
MD5
decd69850749812d81cb32c7e9cc24b0
-
SHA1
bd2b5c52f6882c492a9ce4f3d68e2d82d7dadd5f
-
SHA256
bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6e
-
SHA512
853bddf57829708c0809c7c16c8a19f9dc511879e3949cb0ee343f79fb04e80ac0b0413b9210149cf18007a469f9c917a422e4d9bc1b2e624c560600560abe0c
-
SSDEEP
196608:0suAqMdlAfcdlhzU9GNdlAfcdlftI7dGdlAfcdlhzU9GNdlAfcdlO:PqKzSGsdYzSGO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2724 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe -
Executes dropped EXE 1 IoCs
pid Process 2724 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 15 pastebin.com -
resource yara_rule behavioral2/memory/1376-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/files/0x0009000000023474-12.dat upx behavioral2/memory/2724-14-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Program crash 15 IoCs
pid pid_target Process procid_target 2780 2724 WerFault.exe 82 1652 2724 WerFault.exe 82 4232 2724 WerFault.exe 82 4796 2724 WerFault.exe 82 2220 2724 WerFault.exe 82 4704 2724 WerFault.exe 82 3508 2724 WerFault.exe 82 1176 2724 WerFault.exe 82 388 2724 WerFault.exe 82 3468 2724 WerFault.exe 82 2756 2724 WerFault.exe 82 1852 2724 WerFault.exe 82 2288 2724 WerFault.exe 82 1760 2724 WerFault.exe 82 3880 2724 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4056 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1376 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1376 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 2724 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1376 wrote to memory of 2724 1376 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 82 PID 1376 wrote to memory of 2724 1376 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 82 PID 1376 wrote to memory of 2724 1376 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 82 PID 2724 wrote to memory of 4056 2724 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 83 PID 2724 wrote to memory of 4056 2724 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 83 PID 2724 wrote to memory of 4056 2724 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 83 PID 2724 wrote to memory of 1756 2724 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 85 PID 2724 wrote to memory of 1756 2724 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 85 PID 2724 wrote to memory of 1756 2724 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 85 PID 1756 wrote to memory of 4220 1756 cmd.exe 87 PID 1756 wrote to memory of 4220 1756 cmd.exe 87 PID 1756 wrote to memory of 4220 1756 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe"C:\Users\Admin\AppData\Local\Temp\bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exeC:\Users\Admin\AppData\Local\Temp\bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe" /TN RYTvY5fia886 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4056
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN RYTvY5fia886 > C:\Users\Admin\AppData\Local\Temp\lhOoYMX.xml3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN RYTvY5fia8864⤵
- System Location Discovery: System Language Discovery
PID:4220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 6083⤵
- Program crash
PID:2780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 6283⤵
- Program crash
PID:1652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 7403⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 6323⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 7763⤵
- Program crash
PID:2220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 7283⤵
- Program crash
PID:4704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 13643⤵
- Program crash
PID:3508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 15043⤵
- Program crash
PID:1176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 15323⤵
- Program crash
PID:388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 17403⤵
- Program crash
PID:3468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 16243⤵
- Program crash
PID:2756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 15643⤵
- Program crash
PID:1852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 15683⤵
- Program crash
PID:2288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 17683⤵
- Program crash
PID:1760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 15163⤵
- Program crash
PID:3880
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2724 -ip 27241⤵PID:3304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2724 -ip 27241⤵PID:3548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2724 -ip 27241⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2724 -ip 27241⤵PID:2668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2724 -ip 27241⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2724 -ip 27241⤵PID:5024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2724 -ip 27241⤵PID:3700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2724 -ip 27241⤵PID:752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2724 -ip 27241⤵PID:1512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2724 -ip 27241⤵PID:1152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2724 -ip 27241⤵PID:640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2724 -ip 27241⤵PID:2980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 2724 -ip 27241⤵PID:2956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2724 -ip 27241⤵PID:1112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2724 -ip 27241⤵PID:2148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe
Filesize6.4MB
MD590b6ae7905b43bc84a246642bdd28b2e
SHA1019b0eec6278650262db32f16812f7971911f8ba
SHA256a85066d68ea34536b805275a8925635df433d45433d7a3b8bc44c363b32a8bc2
SHA5123c425930d281dd22d347ab063f8c797a52c7353bce626601c268c56e377947b03eed4239f353424cc8e590d999b9e453787b4221347b2a1c32a3d5a02ef0fc31
-
Filesize
1KB
MD544f863936581c5def3b8e64c140f1a18
SHA137fe9f6ec6071b74683e08e2dcb3e06c1f283f36
SHA256884322bc5888fa28ec473d6036dd2e921336df03a64a0fb2b1da8f1f842327de
SHA512ee14b6a8dd524dc6252d0ab38b07e745a6876082fe3820d1a3e4d3a053521f423287c0e49186ff2c71661b6ca83cd2e52fed5343871072a8b28573cca7e94cfd