Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2023, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe
Resource
win10v2004-20231023-en
General
-
Target
7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe
-
Size
371KB
-
MD5
39031b603dfec9cb262b06b023e75162
-
SHA1
ea4becf8795bfc19444e01f5ee05f96505650f83
-
SHA256
7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3
-
SHA512
b3006993fdd5f6b0f56cf583a18ce5e1a1369ae68b613b571db08225a5a1000c28d6d14a094e87cda3d1aeab695caed4d775e1d06c390be8fc975d1159e1cc95
-
SSDEEP
6144:0LulNUMh/jih8MugQ6uFG6nqqCBvnVOY+XJ5ezwv3gCEpOtlpD96q:0alNUMhGhDuJLnqqC1VH+Z5ezwfgCEpu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation 7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation Utsysc.exe -
Executes dropped EXE 3 IoCs
pid Process 3992 Utsysc.exe 1508 Utsysc.exe 4248 Utsysc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 32 IoCs
pid pid_target Process procid_target 4132 1132 WerFault.exe 61 3760 1132 WerFault.exe 61 812 1132 WerFault.exe 61 860 1132 WerFault.exe 61 3092 1132 WerFault.exe 61 4988 1132 WerFault.exe 61 1404 1132 WerFault.exe 61 648 1132 WerFault.exe 61 4344 1132 WerFault.exe 61 2200 1132 WerFault.exe 61 4732 3992 WerFault.exe 116 3144 3992 WerFault.exe 116 4176 3992 WerFault.exe 116 1612 3992 WerFault.exe 116 5044 3992 WerFault.exe 116 1616 3992 WerFault.exe 116 3284 3992 WerFault.exe 116 4696 3992 WerFault.exe 116 3092 3992 WerFault.exe 116 3964 3992 WerFault.exe 116 1404 3992 WerFault.exe 116 4044 3992 WerFault.exe 116 2416 3992 WerFault.exe 116 4396 3992 WerFault.exe 116 3348 3992 WerFault.exe 116 3960 3992 WerFault.exe 116 3144 3992 WerFault.exe 116 4908 3992 WerFault.exe 116 3812 1508 WerFault.exe 161 4972 3992 WerFault.exe 116 3648 4248 WerFault.exe 167 1216 3992 WerFault.exe 116 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1688 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1132 7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1132 wrote to memory of 3992 1132 7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe 116 PID 1132 wrote to memory of 3992 1132 7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe 116 PID 1132 wrote to memory of 3992 1132 7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe 116 PID 3992 wrote to memory of 1688 3992 Utsysc.exe 133 PID 3992 wrote to memory of 1688 3992 Utsysc.exe 133 PID 3992 wrote to memory of 1688 3992 Utsysc.exe 133
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe"C:\Users\Admin\AppData\Local\Temp\7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 5842⤵
- Program crash
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 6602⤵
- Program crash
PID:3760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 7362⤵
- Program crash
PID:812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 8322⤵
- Program crash
PID:860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 8722⤵
- Program crash
PID:3092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 8802⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 11042⤵
- Program crash
PID:1404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 11402⤵
- Program crash
PID:648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 12122⤵
- Program crash
PID:4344
-
-
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 6083⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 7523⤵
- Program crash
PID:3144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 7523⤵
- Program crash
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 9763⤵
- Program crash
PID:1612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 9963⤵
- Program crash
PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 10163⤵
- Program crash
PID:1616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 9643⤵
- Program crash
PID:3284
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:1688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 9123⤵
- Program crash
PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 6083⤵
- Program crash
PID:3092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 6963⤵
- Program crash
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 6763⤵
- Program crash
PID:1404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 12203⤵
- Program crash
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 12003⤵
- Program crash
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 12443⤵
- Program crash
PID:4396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 13163⤵
- Program crash
PID:3348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 11963⤵
- Program crash
PID:3960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 13523⤵
- Program crash
PID:3144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 10603⤵
- Program crash
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 14203⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 16843⤵
- Program crash
PID:1216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 12522⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1132 -ip 11321⤵PID:760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1132 -ip 11321⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1132 -ip 11321⤵PID:3520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1132 -ip 11321⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1132 -ip 11321⤵PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1132 -ip 11321⤵PID:3452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1132 -ip 11321⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1132 -ip 11321⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1132 -ip 11321⤵PID:2420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1132 -ip 11321⤵PID:4228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3992 -ip 39921⤵PID:3376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3992 -ip 39921⤵PID:3260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3992 -ip 39921⤵PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3992 -ip 39921⤵PID:2436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 3992 -ip 39921⤵PID:3624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3992 -ip 39921⤵PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3992 -ip 39921⤵PID:1232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3992 -ip 39921⤵PID:2308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3992 -ip 39921⤵PID:1788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 3992 -ip 39921⤵PID:1216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 3992 -ip 39921⤵PID:1364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 3992 -ip 39921⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 3992 -ip 39921⤵PID:2420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 3992 -ip 39921⤵PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 3992 -ip 39921⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3992 -ip 39921⤵PID:1548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 748 -p 3992 -ip 39921⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 3992 -ip 39921⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe1⤵
- Executes dropped EXE
PID:1508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 4322⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 1508 -ip 15081⤵PID:1764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 3992 -ip 39921⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe1⤵
- Executes dropped EXE
PID:4248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 4322⤵
- Program crash
PID:3648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4248 -ip 42481⤵PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 3992 -ip 39921⤵PID:4780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
371KB
MD539031b603dfec9cb262b06b023e75162
SHA1ea4becf8795bfc19444e01f5ee05f96505650f83
SHA2567cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3
SHA512b3006993fdd5f6b0f56cf583a18ce5e1a1369ae68b613b571db08225a5a1000c28d6d14a094e87cda3d1aeab695caed4d775e1d06c390be8fc975d1159e1cc95
-
Filesize
371KB
MD539031b603dfec9cb262b06b023e75162
SHA1ea4becf8795bfc19444e01f5ee05f96505650f83
SHA2567cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3
SHA512b3006993fdd5f6b0f56cf583a18ce5e1a1369ae68b613b571db08225a5a1000c28d6d14a094e87cda3d1aeab695caed4d775e1d06c390be8fc975d1159e1cc95
-
Filesize
371KB
MD539031b603dfec9cb262b06b023e75162
SHA1ea4becf8795bfc19444e01f5ee05f96505650f83
SHA2567cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3
SHA512b3006993fdd5f6b0f56cf583a18ce5e1a1369ae68b613b571db08225a5a1000c28d6d14a094e87cda3d1aeab695caed4d775e1d06c390be8fc975d1159e1cc95
-
Filesize
371KB
MD539031b603dfec9cb262b06b023e75162
SHA1ea4becf8795bfc19444e01f5ee05f96505650f83
SHA2567cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3
SHA512b3006993fdd5f6b0f56cf583a18ce5e1a1369ae68b613b571db08225a5a1000c28d6d14a094e87cda3d1aeab695caed4d775e1d06c390be8fc975d1159e1cc95
-
Filesize
371KB
MD539031b603dfec9cb262b06b023e75162
SHA1ea4becf8795bfc19444e01f5ee05f96505650f83
SHA2567cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3
SHA512b3006993fdd5f6b0f56cf583a18ce5e1a1369ae68b613b571db08225a5a1000c28d6d14a094e87cda3d1aeab695caed4d775e1d06c390be8fc975d1159e1cc95