Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2024 16:17
Static task
static1
Behavioral task
behavioral1
Sample
dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80.exe
Resource
win10v2004-20241007-en
General
-
Target
dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80.exe
-
Size
1.6MB
-
MD5
9ff9e0b9601d48a256409e5831a086be
-
SHA1
b004eb0dae356da360b3efe55c8b281e0dc93b64
-
SHA256
dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80
-
SHA512
da597b90a515a538a29519e7491afb270f3b32157a5fc289467198c0836436acda056ae27969e56f83462d6fa20aa3e24348bd462e39e73d50b50328bc302f1d
-
SSDEEP
6144:6VXtCGgA9T7uUVaIvbXCRxo2HHVKwIsgKNEYcevyODHqwsfPuu4TJ+voESuxDnxS:6VW+mu3wpgFl+98rOJx
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1780-27-0x000002118DB50000-0x000002118DB9D000-memory.dmp mimikatz -
Suspicious use of SetThreadContext 4 IoCs
Processes:
werfault.exedescription pid Process procid_target PID 1196 set thread context of 1400 1196 werfault.exe 99 PID 1196 set thread context of 2348 1196 werfault.exe 103 PID 1196 set thread context of 1780 1196 werfault.exe 106 PID 1196 set thread context of 2564 1196 werfault.exe 107 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid Process 1016 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
werfault.exerundll32.exerundll32.exepid Process 1196 werfault.exe 1196 werfault.exe 1780 rundll32.exe 1780 rundll32.exe 1780 rundll32.exe 1780 rundll32.exe 1780 rundll32.exe 1780 rundll32.exe 2564 rundll32.exe 2564 rundll32.exe 1196 werfault.exe 1196 werfault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rundll32.exerundll32.exedescription pid Process Token: SeDebugPrivilege 1780 rundll32.exe Token: SeDebugPrivilege 2564 rundll32.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
werfault.exerundll32.exerundll32.exelsass.exedescription pid Process procid_target PID 1196 wrote to memory of 1400 1196 werfault.exe 99 PID 1196 wrote to memory of 1400 1196 werfault.exe 99 PID 1196 wrote to memory of 1400 1196 werfault.exe 99 PID 1400 wrote to memory of 1016 1400 rundll32.exe 101 PID 1400 wrote to memory of 1016 1400 rundll32.exe 101 PID 1196 wrote to memory of 2348 1196 werfault.exe 103 PID 1196 wrote to memory of 2348 1196 werfault.exe 103 PID 1196 wrote to memory of 2348 1196 werfault.exe 103 PID 1196 wrote to memory of 4724 1196 werfault.exe 104 PID 1196 wrote to memory of 4724 1196 werfault.exe 104 PID 1196 wrote to memory of 1780 1196 werfault.exe 106 PID 1196 wrote to memory of 1780 1196 werfault.exe 106 PID 1196 wrote to memory of 1780 1196 werfault.exe 106 PID 1196 wrote to memory of 2564 1196 werfault.exe 107 PID 1196 wrote to memory of 2564 1196 werfault.exe 107 PID 1196 wrote to memory of 2564 1196 werfault.exe 107 PID 2564 wrote to memory of 676 2564 rundll32.exe 7 PID 2564 wrote to memory of 676 2564 rundll32.exe 7 PID 676 wrote to memory of 2920 676 lsass.exe 50 PID 676 wrote to memory of 2920 676 lsass.exe 50 PID 676 wrote to memory of 3160 676 lsass.exe 108 PID 676 wrote to memory of 3160 676 lsass.exe 108 PID 676 wrote to memory of 3160 676 lsass.exe 108 PID 676 wrote to memory of 3160 676 lsass.exe 108 PID 676 wrote to memory of 3160 676 lsass.exe 108 PID 676 wrote to memory of 3160 676 lsass.exe 108 PID 676 wrote to memory of 3160 676 lsass.exe 108 PID 676 wrote to memory of 3160 676 lsass.exe 108 PID 676 wrote to memory of 3160 676 lsass.exe 108 PID 676 wrote to memory of 3160 676 lsass.exe 108 PID 676 wrote to memory of 3160 676 lsass.exe 108 PID 676 wrote to memory of 2920 676 lsass.exe 50 PID 676 wrote to memory of 1784 676 lsass.exe 110 PID 676 wrote to memory of 1784 676 lsass.exe 110 PID 676 wrote to memory of 1784 676 lsass.exe 110 PID 676 wrote to memory of 1784 676 lsass.exe 110 PID 676 wrote to memory of 1784 676 lsass.exe 110 PID 676 wrote to memory of 1784 676 lsass.exe 110 PID 676 wrote to memory of 1784 676 lsass.exe 110 PID 676 wrote to memory of 1784 676 lsass.exe 110 PID 676 wrote to memory of 1784 676 lsass.exe 110 PID 676 wrote to memory of 1784 676 lsass.exe 110 PID 676 wrote to memory of 1784 676 lsass.exe 110 PID 676 wrote to memory of 2920 676 lsass.exe 50 PID 676 wrote to memory of 2920 676 lsass.exe 50 PID 676 wrote to memory of 2920 676 lsass.exe 50 PID 676 wrote to memory of 2920 676 lsass.exe 50 PID 676 wrote to memory of 2920 676 lsass.exe 50 PID 676 wrote to memory of 2920 676 lsass.exe 50 PID 676 wrote to memory of 2920 676 lsass.exe 50 PID 1196 wrote to memory of 3508 1196 werfault.exe 56
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:676
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2920
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80.exe"C:\Users\Admin\AppData\Local\Temp\dcb3ab43a6ea430667bd1b5283ef0db79b2349031c0e91b3b4e1403b24c98d80.exe"2⤵PID:1844
-
C:\Windows\System32\werfault.exe\??\C:\Windows\System32\werfault.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /all5⤵
- Gathers network information
PID:1016
-
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:2348
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C set4⤵PID:4724
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564
-
-
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:3160
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:1784