Analysis
-
max time kernel
95s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe
Resource
win10v2004-20241007-en
General
-
Target
b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe
-
Size
1004KB
-
MD5
b2c7e470722d7551f9b65f5c02fb8e50
-
SHA1
6d181aba79a8477f08e4fa18eb1211061e0e0bc9
-
SHA256
b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2
-
SHA512
87314ee4367a82daf71f02e0c65233c8e0a9c088ad8ff6db8b0f3e4c5fc6e7cac505adeaf520b8ee133591a2499fd2dba4605eacddf33f96a4051097fd3efc57
-
SSDEEP
12288:YjagpagWRYmHAc2bpINtxvR7NhxHG9y7Z4ZRaru9s5iu2UbxioVBtujVDa/ZSCB8:YjFpgL2KtxS9y7Ka3sI6a/ZSCBHn677
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2824 b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe -
Executes dropped EXE 1 IoCs
pid Process 2824 b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 16 pastebin.com 17 pastebin.com -
Program crash 14 IoCs
pid pid_target Process procid_target 2240 688 WerFault.exe 82 4828 2824 WerFault.exe 90 4440 2824 WerFault.exe 90 4084 2824 WerFault.exe 90 2736 2824 WerFault.exe 90 4592 2824 WerFault.exe 90 2988 2824 WerFault.exe 90 2276 2824 WerFault.exe 90 2688 2824 WerFault.exe 90 2892 2824 WerFault.exe 90 3584 2824 WerFault.exe 90 1528 2824 WerFault.exe 90 1268 2824 WerFault.exe 90 1652 2824 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2824 b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe 2824 b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 688 b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2824 b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 688 wrote to memory of 2824 688 b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe 90 PID 688 wrote to memory of 2824 688 b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe 90 PID 688 wrote to memory of 2824 688 b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe"C:\Users\Admin\AppData\Local\Temp\b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 688 -s 3522⤵
- Program crash
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exeC:\Users\Admin\AppData\Local\Temp\b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 3443⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 6283⤵
- Program crash
PID:4440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 6283⤵
- Program crash
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 6283⤵
- Program crash
PID:2736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 7283⤵
- Program crash
PID:4592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 9043⤵
- Program crash
PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 14083⤵
- Program crash
PID:2276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 14563⤵
- Program crash
PID:2688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 14723⤵
- Program crash
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 15243⤵
- Program crash
PID:3584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 14603⤵
- Program crash
PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 14803⤵
- Program crash
PID:1268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 15323⤵
- Program crash
PID:1652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 688 -ip 6881⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2824 -ip 28241⤵PID:3316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2824 -ip 28241⤵PID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2824 -ip 28241⤵PID:684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2824 -ip 28241⤵PID:2696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2824 -ip 28241⤵PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2824 -ip 28241⤵PID:4232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2824 -ip 28241⤵PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2824 -ip 28241⤵PID:2648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2824 -ip 28241⤵PID:2496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2824 -ip 28241⤵PID:3236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2824 -ip 28241⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2824 -ip 28241⤵PID:2452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2824 -ip 28241⤵PID:2456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\b3fa5a79f8fe6d79aa291d605e5a521e292af6ac8123ff25253e939ee07ce0b2N.exe
Filesize1004KB
MD59475560168e1b71765c939269ca90998
SHA1d8a17f494e291f22c957b151469b3e9a74868332
SHA256029009ad8ed9e21349a114d16e16df8fde3c9182617cd7753ca67bc4f38c4025
SHA512a90cd18c378bf7af003cd89605ffac868c221736cdf45b137ae07252a69830d5c085a1fb1406fbfcb57a986262680d06a48f5bf0d38a7d462116214623e8d696