Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 02:48
Behavioral task
behavioral1
Sample
e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe
Resource
win7-20240903-en
General
-
Target
e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe
-
Size
3.0MB
-
MD5
473a160ff926d6b50e4b1361454ad373
-
SHA1
86f8be7c76a05370e1c6871850bf3cd9c301dd5b
-
SHA256
e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e
-
SHA512
e17921c546b0dfef6f186c404941fccbd643ec4d26cd3c324fb395dc1d31364348cd76ce9333bc73b931513dc12fd93ca287a98bc26cc8e649b4cca1a11d65b9
-
SSDEEP
49152:SzAe4VYgMtEvcakLoIXKihPX2cakLJjSlqVTqZsJIrlcakLoIXKihPX2cakLj:qr4HMecakhXKihPmcak0l2Tq+JIrlcaC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3516 e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe -
Executes dropped EXE 1 IoCs
pid Process 3516 e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 20 pastebin.com -
resource yara_rule behavioral2/memory/2084-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral2/files/0x000c000000023b36-12.dat upx behavioral2/memory/3516-13-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Program crash 20 IoCs
pid pid_target Process procid_target 4584 3516 WerFault.exe 87 2024 3516 WerFault.exe 87 1892 3516 WerFault.exe 87 836 3516 WerFault.exe 87 3608 3516 WerFault.exe 87 3460 3516 WerFault.exe 87 448 3516 WerFault.exe 87 3232 3516 WerFault.exe 87 1836 3516 WerFault.exe 87 4844 3516 WerFault.exe 87 2992 3516 WerFault.exe 87 4848 3516 WerFault.exe 87 2012 3516 WerFault.exe 87 1504 3516 WerFault.exe 87 4408 3516 WerFault.exe 87 1212 3516 WerFault.exe 87 1712 3516 WerFault.exe 87 2624 3516 WerFault.exe 87 1696 3516 WerFault.exe 87 4624 3516 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3556 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2084 e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2084 e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe 3516 e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2084 wrote to memory of 3516 2084 e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe 87 PID 2084 wrote to memory of 3516 2084 e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe 87 PID 2084 wrote to memory of 3516 2084 e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe 87 PID 3516 wrote to memory of 3556 3516 e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe 88 PID 3516 wrote to memory of 3556 3516 e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe 88 PID 3516 wrote to memory of 3556 3516 e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe 88 PID 3516 wrote to memory of 3196 3516 e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe 90 PID 3516 wrote to memory of 3196 3516 e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe 90 PID 3516 wrote to memory of 3196 3516 e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe 90 PID 3196 wrote to memory of 3628 3196 cmd.exe 92 PID 3196 wrote to memory of 3628 3196 cmd.exe 92 PID 3196 wrote to memory of 3628 3196 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe"C:\Users\Admin\AppData\Local\Temp\e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exeC:\Users\Admin\AppData\Local\Temp\e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe" /TN nolmOrxs46ee /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3556
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN nolmOrxs46ee > C:\Users\Admin\AppData\Local\Temp\6KUDD.xml3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN nolmOrxs46ee4⤵
- System Location Discovery: System Language Discovery
PID:3628
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 6043⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 6203⤵
- Program crash
PID:2024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 6523⤵
- Program crash
PID:1892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 7323⤵
- Program crash
PID:836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 7323⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 7803⤵
- Program crash
PID:3460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 14723⤵
- Program crash
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 15243⤵
- Program crash
PID:3232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 17483⤵
- Program crash
PID:1836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 15603⤵
- Program crash
PID:4844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 15443⤵
- Program crash
PID:2992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 15283⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 15403⤵
- Program crash
PID:2012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 15923⤵
- Program crash
PID:1504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 17723⤵
- Program crash
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 17763⤵
- Program crash
PID:1212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 18763⤵
- Program crash
PID:1712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 18443⤵
- Program crash
PID:2624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 17163⤵
- Program crash
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 7243⤵
- Program crash
PID:4624
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3516 -ip 35161⤵PID:1940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3516 -ip 35161⤵PID:4560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3516 -ip 35161⤵PID:2264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3516 -ip 35161⤵PID:2540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3516 -ip 35161⤵PID:2592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3516 -ip 35161⤵PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3516 -ip 35161⤵PID:3108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3516 -ip 35161⤵PID:3188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3516 -ip 35161⤵PID:2368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3516 -ip 35161⤵PID:2888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3516 -ip 35161⤵PID:1856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3516 -ip 35161⤵PID:4060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3516 -ip 35161⤵PID:4624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3516 -ip 35161⤵PID:2668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3516 -ip 35161⤵PID:4516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3516 -ip 35161⤵PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3516 -ip 35161⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3516 -ip 35161⤵PID:3728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3516 -ip 35161⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3516 -ip 35161⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55b28c700481c90f4b842cab694e6dc98
SHA1e0dd7ef90ae0fc2b89da7947724beac8c6b2c29f
SHA256104b6fa253632bf822a88039660584f4cd947a6c4f6665a6f345e0a28b8e8677
SHA512c811f348808cf58cefe18e40869a858dd8a56b6f1ec679a0cea35cab08037afc5ce221b8204bfa458e12f914b034e3b6aa2497ad42cdc98ca2b94de9345d6c73
-
C:\Users\Admin\AppData\Local\Temp\e97bc9bd73cae673f7523a3221fb1a7aaec7d658fe0577bbd7d0c673a08b243e.exe
Filesize3.0MB
MD583c106ab942c8839ef062e28df8d046c
SHA1bd40031df9e4c8829a5f0b67ebc04f46f24f3668
SHA2568e0a1341bcca4f5f3d40456e4f7bd938c9daa0146f55c3d5b636c6d1dd6f4f05
SHA51225d76da9c856170be81120f5be3fb3a0e437d549abfb7ab229c6452c3a678c58485cb68a043472432999f6de52f175582de370aa1fbd77aa058c29ea361935e4