Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80.exe
Resource
win10v2004-20241007-en
General
-
Target
dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80.exe
-
Size
1.6MB
-
MD5
9ff9e0b9601d48a256409e5831a086be
-
SHA1
b004eb0dae356da360b3efe55c8b281e0dc93b64
-
SHA256
dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80
-
SHA512
da597b90a515a538a29519e7491afb270f3b32157a5fc289467198c0836436acda056ae27969e56f83462d6fa20aa3e24348bd462e39e73d50b50328bc302f1d
-
SSDEEP
6144:6VXtCGgA9T7uUVaIvbXCRxo2HHVKwIsgKNEYcevyODHqwsfPuu4TJ+voESuxDnxS:6VW+mu3wpgFl+98rOJx
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3808-26-0x000001C4C1510000-0x000001C4C155D000-memory.dmp mimikatz -
Suspicious use of SetThreadContext 5 IoCs
Processes:
werfault.exedescription pid process target process PID 2944 set thread context of 3932 2944 werfault.exe rundll32.exe PID 2944 set thread context of 4752 2944 werfault.exe rundll32.exe PID 2944 set thread context of 3808 2944 werfault.exe rundll32.exe PID 2944 set thread context of 2996 2944 werfault.exe rundll32.exe PID 2944 set thread context of 1180 2944 werfault.exe rundll32.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1316 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
werfault.exerundll32.exerundll32.exepid process 2944 werfault.exe 2944 werfault.exe 3808 rundll32.exe 3808 rundll32.exe 3808 rundll32.exe 3808 rundll32.exe 3808 rundll32.exe 3808 rundll32.exe 2996 rundll32.exe 2996 rundll32.exe 2944 werfault.exe 2944 werfault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rundll32.exerundll32.exedescription pid process Token: SeDebugPrivilege 3808 rundll32.exe Token: SeDebugPrivilege 2996 rundll32.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
werfault.exerundll32.exerundll32.exelsass.exedescription pid process target process PID 2944 wrote to memory of 3932 2944 werfault.exe rundll32.exe PID 2944 wrote to memory of 3932 2944 werfault.exe rundll32.exe PID 2944 wrote to memory of 3932 2944 werfault.exe rundll32.exe PID 3932 wrote to memory of 1316 3932 rundll32.exe ipconfig.exe PID 3932 wrote to memory of 1316 3932 rundll32.exe ipconfig.exe PID 2944 wrote to memory of 4752 2944 werfault.exe rundll32.exe PID 2944 wrote to memory of 4752 2944 werfault.exe rundll32.exe PID 2944 wrote to memory of 4752 2944 werfault.exe rundll32.exe PID 2944 wrote to memory of 1700 2944 werfault.exe cmd.exe PID 2944 wrote to memory of 1700 2944 werfault.exe cmd.exe PID 2944 wrote to memory of 3808 2944 werfault.exe rundll32.exe PID 2944 wrote to memory of 3808 2944 werfault.exe rundll32.exe PID 2944 wrote to memory of 3808 2944 werfault.exe rundll32.exe PID 2944 wrote to memory of 2996 2944 werfault.exe rundll32.exe PID 2944 wrote to memory of 2996 2944 werfault.exe rundll32.exe PID 2944 wrote to memory of 2996 2944 werfault.exe rundll32.exe PID 2996 wrote to memory of 664 2996 rundll32.exe lsass.exe PID 2996 wrote to memory of 664 2996 rundll32.exe lsass.exe PID 664 wrote to memory of 2572 664 lsass.exe sysmon.exe PID 2944 wrote to memory of 1180 2944 werfault.exe rundll32.exe PID 2944 wrote to memory of 1180 2944 werfault.exe rundll32.exe PID 2944 wrote to memory of 1180 2944 werfault.exe rundll32.exe PID 664 wrote to memory of 2572 664 lsass.exe sysmon.exe PID 664 wrote to memory of 2572 664 lsass.exe sysmon.exe PID 664 wrote to memory of 2460 664 lsass.exe backgroundTaskHost.exe PID 664 wrote to memory of 2460 664 lsass.exe backgroundTaskHost.exe PID 664 wrote to memory of 2460 664 lsass.exe backgroundTaskHost.exe PID 664 wrote to memory of 2460 664 lsass.exe backgroundTaskHost.exe PID 664 wrote to memory of 2460 664 lsass.exe backgroundTaskHost.exe PID 664 wrote to memory of 2460 664 lsass.exe backgroundTaskHost.exe PID 664 wrote to memory of 2460 664 lsass.exe backgroundTaskHost.exe PID 664 wrote to memory of 2460 664 lsass.exe backgroundTaskHost.exe PID 664 wrote to memory of 2460 664 lsass.exe backgroundTaskHost.exe PID 664 wrote to memory of 2460 664 lsass.exe backgroundTaskHost.exe PID 664 wrote to memory of 2460 664 lsass.exe backgroundTaskHost.exe PID 664 wrote to memory of 2572 664 lsass.exe sysmon.exe PID 664 wrote to memory of 2572 664 lsass.exe sysmon.exe PID 664 wrote to memory of 4504 664 lsass.exe BackgroundTransferHost.exe PID 664 wrote to memory of 4504 664 lsass.exe BackgroundTransferHost.exe PID 664 wrote to memory of 4504 664 lsass.exe BackgroundTransferHost.exe PID 664 wrote to memory of 4504 664 lsass.exe BackgroundTransferHost.exe PID 664 wrote to memory of 4504 664 lsass.exe BackgroundTransferHost.exe PID 664 wrote to memory of 4504 664 lsass.exe BackgroundTransferHost.exe PID 664 wrote to memory of 4504 664 lsass.exe BackgroundTransferHost.exe PID 664 wrote to memory of 4504 664 lsass.exe BackgroundTransferHost.exe PID 664 wrote to memory of 4504 664 lsass.exe BackgroundTransferHost.exe PID 664 wrote to memory of 4504 664 lsass.exe BackgroundTransferHost.exe PID 664 wrote to memory of 4504 664 lsass.exe BackgroundTransferHost.exe PID 664 wrote to memory of 2572 664 lsass.exe sysmon.exe PID 664 wrote to memory of 2572 664 lsass.exe sysmon.exe PID 664 wrote to memory of 2572 664 lsass.exe sysmon.exe PID 664 wrote to memory of 2572 664 lsass.exe sysmon.exe PID 2944 wrote to memory of 3424 2944 werfault.exe Explorer.EXE PID 664 wrote to memory of 2572 664 lsass.exe sysmon.exe PID 664 wrote to memory of 2572 664 lsass.exe sysmon.exe PID 664 wrote to memory of 2572 664 lsass.exe sysmon.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:664
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2572
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80.exe"C:\Users\Admin\AppData\Local\Temp\dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80.exe"2⤵PID:3436
-
C:\Windows\System32\werfault.exe\??\C:\Windows\System32\werfault.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /all5⤵
- Gathers network information
PID:1316
-
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C set4⤵PID:1700
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:1180
-
-
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2460
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:4504