Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 21:12
Static task
static1
Behavioral task
behavioral1
Sample
75879295ef6daf7f8cd035e9a04218d9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
75879295ef6daf7f8cd035e9a04218d9.exe
Resource
win10v2004-20231222-en
General
-
Target
75879295ef6daf7f8cd035e9a04218d9.exe
-
Size
211KB
-
MD5
75879295ef6daf7f8cd035e9a04218d9
-
SHA1
a3e286680c49365945092e00a1f7daf29f1d6876
-
SHA256
796984b6441982bc882aa42f4eee533d01f7ee841039bdb0bc5c3526b3a16db6
-
SHA512
76b43d039e6d45195df7b697bbb1df93c455de364409c5dc25f49ca73acae249b8d04b966a426a74bb5e92c58d44880de243d7fa55b6427acc565c7809ad1968
-
SSDEEP
3072:DcgRimct5fFJ3EzhahRZ7LKT6JaWrr+RI+rgUk5CD/n:DcrzEg3VLu6JaQEI++5S/n
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 75879295ef6daf7f8cd035e9a04218d9.exe -
Executes dropped EXE 1 IoCs
pid Process 3564 afvkevqt.exe -
Loads dropped DLL 1 IoCs
pid Process 3564 afvkevqt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 17 IoCs
pid pid_target Process procid_target 4456 2648 WerFault.exe 79 1508 2648 WerFault.exe 79 3468 2648 WerFault.exe 79 3956 2648 WerFault.exe 79 4676 2648 WerFault.exe 79 4068 2648 WerFault.exe 79 3624 2648 WerFault.exe 79 4828 2648 WerFault.exe 79 652 3564 WerFault.exe 114 3128 3564 WerFault.exe 114 1928 3564 WerFault.exe 114 4872 3564 WerFault.exe 114 1572 3564 WerFault.exe 114 3388 3564 WerFault.exe 114 4180 3564 WerFault.exe 114 1132 3564 WerFault.exe 114 4748 3564 WerFault.exe 114 -
Kills process with taskkill 1 IoCs
pid Process 3124 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4380 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3564 afvkevqt.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3124 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3564 afvkevqt.exe 3564 afvkevqt.exe 3564 afvkevqt.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3564 afvkevqt.exe 3564 afvkevqt.exe 3564 afvkevqt.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2264 2648 75879295ef6daf7f8cd035e9a04218d9.exe 108 PID 2648 wrote to memory of 2264 2648 75879295ef6daf7f8cd035e9a04218d9.exe 108 PID 2648 wrote to memory of 2264 2648 75879295ef6daf7f8cd035e9a04218d9.exe 108 PID 2264 wrote to memory of 3124 2264 cmd.exe 107 PID 2264 wrote to memory of 3124 2264 cmd.exe 107 PID 2264 wrote to memory of 3124 2264 cmd.exe 107 PID 2264 wrote to memory of 4380 2264 cmd.exe 110 PID 2264 wrote to memory of 4380 2264 cmd.exe 110 PID 2264 wrote to memory of 4380 2264 cmd.exe 110 PID 2264 wrote to memory of 3564 2264 cmd.exe 114 PID 2264 wrote to memory of 3564 2264 cmd.exe 114 PID 2264 wrote to memory of 3564 2264 cmd.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\75879295ef6daf7f8cd035e9a04218d9.exe"C:\Users\Admin\AppData\Local\Temp\75879295ef6daf7f8cd035e9a04218d9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 6122⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 7402⤵
- Program crash
PID:1508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 8242⤵
- Program crash
PID:3468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 9642⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 9682⤵
- Program crash
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 9802⤵
- Program crash
PID:4068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 9922⤵
- Program crash
PID:3624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 1402⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2648 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\75879295ef6daf7f8cd035e9a04218d9.exe" & start C:\Users\Admin\AppData\Local\afvkevqt.exe -f2⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:4380
-
-
C:\Users\Admin\AppData\Local\afvkevqt.exeC:\Users\Admin\AppData\Local\afvkevqt.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 8324⤵
- Program crash
PID:652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 8684⤵
- Program crash
PID:3128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 11804⤵
- Program crash
PID:1928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 12084⤵
- Program crash
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 12004⤵
- Program crash
PID:1572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 12244⤵
- Program crash
PID:3388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 11084⤵
- Program crash
PID:4180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 11764⤵
- Program crash
PID:1132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 12364⤵
- Program crash
PID:4748
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 2648 -ip 26481⤵PID:2752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2648 -ip 26481⤵PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2648 -ip 26481⤵PID:4248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2648 -ip 26481⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2648 -ip 26481⤵PID:3492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2648 -ip 26481⤵PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2648 -ip 26481⤵PID:2916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2648 -ip 26481⤵PID:3360
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 26481⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3564 -ip 35641⤵PID:2824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3564 -ip 35641⤵PID:1520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3564 -ip 35641⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 3564 -ip 35641⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 3564 -ip 35641⤵PID:2460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 3564 -ip 35641⤵PID:4068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3564 -ip 35641⤵PID:3672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3564 -ip 35641⤵PID:3044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3564 -ip 35641⤵PID:2192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD575879295ef6daf7f8cd035e9a04218d9
SHA1a3e286680c49365945092e00a1f7daf29f1d6876
SHA256796984b6441982bc882aa42f4eee533d01f7ee841039bdb0bc5c3526b3a16db6
SHA51276b43d039e6d45195df7b697bbb1df93c455de364409c5dc25f49ca73acae249b8d04b966a426a74bb5e92c58d44880de243d7fa55b6427acc565c7809ad1968