Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80.exe
Resource
win10v2004-20241007-en
General
-
Target
dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80.exe
-
Size
1.6MB
-
MD5
9ff9e0b9601d48a256409e5831a086be
-
SHA1
b004eb0dae356da360b3efe55c8b281e0dc93b64
-
SHA256
dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80
-
SHA512
da597b90a515a538a29519e7491afb270f3b32157a5fc289467198c0836436acda056ae27969e56f83462d6fa20aa3e24348bd462e39e73d50b50328bc302f1d
-
SSDEEP
6144:6VXtCGgA9T7uUVaIvbXCRxo2HHVKwIsgKNEYcevyODHqwsfPuu4TJ+voESuxDnxS:6VW+mu3wpgFl+98rOJx
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral2/memory/3808-26-0x000001C4C1510000-0x000001C4C155D000-memory.dmp mimikatz -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2944 set thread context of 3932 2944 werfault.exe 100 PID 2944 set thread context of 4752 2944 werfault.exe 103 PID 2944 set thread context of 3808 2944 werfault.exe 107 PID 2944 set thread context of 2996 2944 werfault.exe 108 PID 2944 set thread context of 1180 2944 werfault.exe 109 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1316 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2944 werfault.exe 2944 werfault.exe 3808 rundll32.exe 3808 rundll32.exe 3808 rundll32.exe 3808 rundll32.exe 3808 rundll32.exe 3808 rundll32.exe 2996 rundll32.exe 2996 rundll32.exe 2944 werfault.exe 2944 werfault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3808 rundll32.exe Token: SeDebugPrivilege 2996 rundll32.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2944 wrote to memory of 3932 2944 werfault.exe 100 PID 2944 wrote to memory of 3932 2944 werfault.exe 100 PID 2944 wrote to memory of 3932 2944 werfault.exe 100 PID 3932 wrote to memory of 1316 3932 rundll32.exe 102 PID 3932 wrote to memory of 1316 3932 rundll32.exe 102 PID 2944 wrote to memory of 4752 2944 werfault.exe 103 PID 2944 wrote to memory of 4752 2944 werfault.exe 103 PID 2944 wrote to memory of 4752 2944 werfault.exe 103 PID 2944 wrote to memory of 1700 2944 werfault.exe 105 PID 2944 wrote to memory of 1700 2944 werfault.exe 105 PID 2944 wrote to memory of 3808 2944 werfault.exe 107 PID 2944 wrote to memory of 3808 2944 werfault.exe 107 PID 2944 wrote to memory of 3808 2944 werfault.exe 107 PID 2944 wrote to memory of 2996 2944 werfault.exe 108 PID 2944 wrote to memory of 2996 2944 werfault.exe 108 PID 2944 wrote to memory of 2996 2944 werfault.exe 108 PID 2996 wrote to memory of 664 2996 rundll32.exe 7 PID 2996 wrote to memory of 664 2996 rundll32.exe 7 PID 664 wrote to memory of 2572 664 lsass.exe 46 PID 2944 wrote to memory of 1180 2944 werfault.exe 109 PID 2944 wrote to memory of 1180 2944 werfault.exe 109 PID 2944 wrote to memory of 1180 2944 werfault.exe 109 PID 664 wrote to memory of 2572 664 lsass.exe 46 PID 664 wrote to memory of 2572 664 lsass.exe 46 PID 664 wrote to memory of 2460 664 lsass.exe 110 PID 664 wrote to memory of 2460 664 lsass.exe 110 PID 664 wrote to memory of 2460 664 lsass.exe 110 PID 664 wrote to memory of 2460 664 lsass.exe 110 PID 664 wrote to memory of 2460 664 lsass.exe 110 PID 664 wrote to memory of 2460 664 lsass.exe 110 PID 664 wrote to memory of 2460 664 lsass.exe 110 PID 664 wrote to memory of 2460 664 lsass.exe 110 PID 664 wrote to memory of 2460 664 lsass.exe 110 PID 664 wrote to memory of 2460 664 lsass.exe 110 PID 664 wrote to memory of 2460 664 lsass.exe 110 PID 664 wrote to memory of 2572 664 lsass.exe 46 PID 664 wrote to memory of 2572 664 lsass.exe 46 PID 664 wrote to memory of 4504 664 lsass.exe 113 PID 664 wrote to memory of 4504 664 lsass.exe 113 PID 664 wrote to memory of 4504 664 lsass.exe 113 PID 664 wrote to memory of 4504 664 lsass.exe 113 PID 664 wrote to memory of 4504 664 lsass.exe 113 PID 664 wrote to memory of 4504 664 lsass.exe 113 PID 664 wrote to memory of 4504 664 lsass.exe 113 PID 664 wrote to memory of 4504 664 lsass.exe 113 PID 664 wrote to memory of 4504 664 lsass.exe 113 PID 664 wrote to memory of 4504 664 lsass.exe 113 PID 664 wrote to memory of 4504 664 lsass.exe 113 PID 664 wrote to memory of 2572 664 lsass.exe 46 PID 664 wrote to memory of 2572 664 lsass.exe 46 PID 664 wrote to memory of 2572 664 lsass.exe 46 PID 664 wrote to memory of 2572 664 lsass.exe 46 PID 2944 wrote to memory of 3424 2944 werfault.exe 56 PID 664 wrote to memory of 2572 664 lsass.exe 46 PID 664 wrote to memory of 2572 664 lsass.exe 46 PID 664 wrote to memory of 2572 664 lsass.exe 46
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:664
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2572
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80.exe"C:\Users\Admin\AppData\Local\Temp\dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80.exe"2⤵PID:3436
-
C:\Windows\System32\werfault.exe\??\C:\Windows\System32\werfault.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /all5⤵
- Gathers network information
PID:1316
-
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C set4⤵PID:1700
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:1180
-
-
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2460
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:4504