Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/12/2023, 20:34

General

  • Target

    f64504e860faff868e8674a67881cee2.exe

  • Size

    1.3MB

  • MD5

    f64504e860faff868e8674a67881cee2

  • SHA1

    4743613cb5572e4d9f7c796f974fe2e8f7772abe

  • SHA256

    3265fe0d40f5fc8fd2c92c8794108a9375fda9f2cfafdac99c6994daff45befa

  • SHA512

    c3bc98e2d373c640a3c09db62fce75edc988612aee7f6472d239fbe6606de9d87e010adff19aadf7cfc512742fcc7791bc73e8a15b4d816405501f007ae90b99

  • SSDEEP

    24576:2cGl5ZvtGOQxMPoVgXco9/MTV5NpkE2RfdZJhMFXB53tXM:yrtGOyMPoVgMgUZ5bkZR1ZTMd3RM

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f64504e860faff868e8674a67881cee2.exe
    "C:\Users\Admin\AppData\Local\Temp\f64504e860faff868e8674a67881cee2.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\server-teste.exe
      "C:\Users\Admin\AppData\Local\Temp\server-teste.exe"
      2⤵
      • Executes dropped EXE
      PID:5056
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 284
        3⤵
        • Program crash
        PID:1696
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5056 -ip 5056
    1⤵
      PID:4016

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\server-teste.exe

            Filesize

            118KB

            MD5

            60681fcb785432565135e3ecc92377a3

            SHA1

            fb244fe3c5aaf340bf0a81c56e0694de12404f68

            SHA256

            b43a5676a8b362c509956ada42453e6821e85e32679279d669ed5187963536e9

            SHA512

            27530cd06510b5a77d6a80e9422673e13428443e28af42401b5e5e6d32104c56a55c419ac886919175be29a406cf710a654acea3ac24f04bb3625e42b6487839

          • C:\Users\Admin\AppData\Local\Temp\server-teste.exe

            Filesize

            1.3MB

            MD5

            b09a4611a34f30cd75ce1fc9cdcc1e26

            SHA1

            01c5be40120cde718365145a2bdbd72295cec0c6

            SHA256

            297e8483005adcd6d76f1512a788a396aa58ad7ff26591b0df4b26ee9b3e8a2a

            SHA512

            457b2787faf059d195058da6846435ef445b0b406d594ebbb4567e4a609874e9813ac9445053bf3465f153f030e523de302400c1110ff92d073672cbd5c389fe

          • C:\Users\Admin\AppData\Local\Temp\server-teste.exe

            Filesize

            121KB

            MD5

            77c38329233db7190a472d6f78dd52bc

            SHA1

            4748b1951896821d663796b6d9b294be94f81ba2

            SHA256

            f558fd50b36d856b43e6a43aa7ec9e39b1c45ebdf5765ac3a833d5674a244646

            SHA512

            8d5a8aca23470100317f153417a7466f942553fc915464d7042301567afe38a7991a88fd51e95989471c17ef282eff18e24eacd0190e5d41d793bc89900d6dfa

          • memory/5056-11-0x00000000022A0000-0x00000000022A1000-memory.dmp

            Filesize

            4KB

          • memory/5056-12-0x0000000000A10000-0x0000000000AED000-memory.dmp

            Filesize

            884KB