Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2023, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe
Resource
win10v2004-20231023-en
General
-
Target
7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe
-
Size
371KB
-
MD5
39031b603dfec9cb262b06b023e75162
-
SHA1
ea4becf8795bfc19444e01f5ee05f96505650f83
-
SHA256
7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3
-
SHA512
b3006993fdd5f6b0f56cf583a18ce5e1a1369ae68b613b571db08225a5a1000c28d6d14a094e87cda3d1aeab695caed4d775e1d06c390be8fc975d1159e1cc95
-
SSDEEP
6144:0LulNUMh/jih8MugQ6uFG6nqqCBvnVOY+XJ5ezwv3gCEpOtlpD96q:0alNUMhGhDuJLnqqC1VH+Z5ezwfgCEpu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation 7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe -
Executes dropped EXE 1 IoCs
pid Process 4672 Utsysc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
pid pid_target Process procid_target 496 3156 WerFault.exe 83 4592 3156 WerFault.exe 83 3748 3156 WerFault.exe 83 4392 3156 WerFault.exe 83 3936 3156 WerFault.exe 83 4728 3156 WerFault.exe 83 1552 3156 WerFault.exe 83 4736 3156 WerFault.exe 83 3884 3156 WerFault.exe 83 1696 3156 WerFault.exe 83 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3156 7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3156 wrote to memory of 4672 3156 7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe 122 PID 3156 wrote to memory of 4672 3156 7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe 122 PID 3156 wrote to memory of 4672 3156 7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe"C:\Users\Admin\AppData\Local\Temp\7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 5842⤵
- Program crash
PID:496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 6082⤵
- Program crash
PID:4592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 7362⤵
- Program crash
PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 7402⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 8522⤵
- Program crash
PID:3936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 8722⤵
- Program crash
PID:4728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 10082⤵
- Program crash
PID:1552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 10762⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 11282⤵
- Program crash
PID:3884
-
-
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"2⤵
- Executes dropped EXE
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 11642⤵
- Program crash
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3156 -ip 31561⤵PID:648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3156 -ip 31561⤵PID:416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3156 -ip 31561⤵PID:1800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3156 -ip 31561⤵PID:940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3156 -ip 31561⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3156 -ip 31561⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3156 -ip 31561⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3156 -ip 31561⤵PID:368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3156 -ip 31561⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3156 -ip 31561⤵PID:1308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
371KB
MD539031b603dfec9cb262b06b023e75162
SHA1ea4becf8795bfc19444e01f5ee05f96505650f83
SHA2567cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3
SHA512b3006993fdd5f6b0f56cf583a18ce5e1a1369ae68b613b571db08225a5a1000c28d6d14a094e87cda3d1aeab695caed4d775e1d06c390be8fc975d1159e1cc95
-
Filesize
371KB
MD539031b603dfec9cb262b06b023e75162
SHA1ea4becf8795bfc19444e01f5ee05f96505650f83
SHA2567cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3
SHA512b3006993fdd5f6b0f56cf583a18ce5e1a1369ae68b613b571db08225a5a1000c28d6d14a094e87cda3d1aeab695caed4d775e1d06c390be8fc975d1159e1cc95
-
Filesize
371KB
MD539031b603dfec9cb262b06b023e75162
SHA1ea4becf8795bfc19444e01f5ee05f96505650f83
SHA2567cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3
SHA512b3006993fdd5f6b0f56cf583a18ce5e1a1369ae68b613b571db08225a5a1000c28d6d14a094e87cda3d1aeab695caed4d775e1d06c390be8fc975d1159e1cc95