Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
f64504e860faff868e8674a67881cee2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f64504e860faff868e8674a67881cee2.exe
Resource
win10v2004-20231222-en
General
-
Target
f64504e860faff868e8674a67881cee2.exe
-
Size
1.3MB
-
MD5
f64504e860faff868e8674a67881cee2
-
SHA1
4743613cb5572e4d9f7c796f974fe2e8f7772abe
-
SHA256
3265fe0d40f5fc8fd2c92c8794108a9375fda9f2cfafdac99c6994daff45befa
-
SHA512
c3bc98e2d373c640a3c09db62fce75edc988612aee7f6472d239fbe6606de9d87e010adff19aadf7cfc512742fcc7791bc73e8a15b4d816405501f007ae90b99
-
SSDEEP
24576:2cGl5ZvtGOQxMPoVgXco9/MTV5NpkE2RfdZJhMFXB53tXM:yrtGOyMPoVgMgUZ5bkZR1ZTMd3RM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation f64504e860faff868e8674a67881cee2.exe -
Executes dropped EXE 1 IoCs
pid Process 5056 server-teste.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1696 5056 WerFault.exe 92 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1680 f64504e860faff868e8674a67881cee2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1680 wrote to memory of 5056 1680 f64504e860faff868e8674a67881cee2.exe 92 PID 1680 wrote to memory of 5056 1680 f64504e860faff868e8674a67881cee2.exe 92 PID 1680 wrote to memory of 5056 1680 f64504e860faff868e8674a67881cee2.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f64504e860faff868e8674a67881cee2.exe"C:\Users\Admin\AppData\Local\Temp\f64504e860faff868e8674a67881cee2.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\server-teste.exe"C:\Users\Admin\AppData\Local\Temp\server-teste.exe"2⤵
- Executes dropped EXE
PID:5056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 2843⤵
- Program crash
PID:1696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5056 -ip 50561⤵PID:4016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD560681fcb785432565135e3ecc92377a3
SHA1fb244fe3c5aaf340bf0a81c56e0694de12404f68
SHA256b43a5676a8b362c509956ada42453e6821e85e32679279d669ed5187963536e9
SHA51227530cd06510b5a77d6a80e9422673e13428443e28af42401b5e5e6d32104c56a55c419ac886919175be29a406cf710a654acea3ac24f04bb3625e42b6487839
-
Filesize
1.3MB
MD5b09a4611a34f30cd75ce1fc9cdcc1e26
SHA101c5be40120cde718365145a2bdbd72295cec0c6
SHA256297e8483005adcd6d76f1512a788a396aa58ad7ff26591b0df4b26ee9b3e8a2a
SHA512457b2787faf059d195058da6846435ef445b0b406d594ebbb4567e4a609874e9813ac9445053bf3465f153f030e523de302400c1110ff92d073672cbd5c389fe
-
Filesize
121KB
MD577c38329233db7190a472d6f78dd52bc
SHA14748b1951896821d663796b6d9b294be94f81ba2
SHA256f558fd50b36d856b43e6a43aa7ec9e39b1c45ebdf5765ac3a833d5674a244646
SHA5128d5a8aca23470100317f153417a7466f942553fc915464d7042301567afe38a7991a88fd51e95989471c17ef282eff18e24eacd0190e5d41d793bc89900d6dfa