Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
7876fb81144bffbb3402257df28a4802.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7876fb81144bffbb3402257df28a4802.exe
Resource
win10v2004-20231215-en
General
-
Target
7876fb81144bffbb3402257df28a4802.exe
-
Size
114KB
-
MD5
7876fb81144bffbb3402257df28a4802
-
SHA1
d7004558c5386e8b3523f1ee764fe130b236bc2d
-
SHA256
3116b19eed5e48480fcf65604ac7df441e0a5970ca8ff3ae4c7d45efe785896e
-
SHA512
75818a91f9c9e65adfb08b64003435d924737115698ee40a87d6cc075feb582ed3490fa0aa9c97f003d266c7dd8a36c0a168727ecfc74bfc510b18fc7cfa27ed
-
SSDEEP
3072:NTQH0qtjoB1aPRdqT5m412kL80sNhexEMTK59HkU/:NTWjoBswTXkkL80sNheK59HV/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 7876fb81144bffbb3402257df28a4802.exe -
Executes dropped EXE 1 IoCs
pid Process 3572 2.exe -
resource yara_rule behavioral2/memory/3572-10-0x0000000000590000-0x0000000000610000-memory.dmp upx behavioral2/memory/3572-12-0x0000000000590000-0x0000000000610000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\2.exe 7876fb81144bffbb3402257df28a4802.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2684 3572 WerFault.exe 88 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3924 7876fb81144bffbb3402257df28a4802.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3924 wrote to memory of 3572 3924 7876fb81144bffbb3402257df28a4802.exe 88 PID 3924 wrote to memory of 3572 3924 7876fb81144bffbb3402257df28a4802.exe 88 PID 3924 wrote to memory of 3572 3924 7876fb81144bffbb3402257df28a4802.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7876fb81144bffbb3402257df28a4802.exe"C:\Users\Admin\AppData\Local\Temp\7876fb81144bffbb3402257df28a4802.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\2.exe"C:\Windows\2.exe"2⤵
- Executes dropped EXE
PID:3572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 3123⤵
- Program crash
PID:2684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3572 -ip 35721⤵PID:4576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD59deb597a80ab24e2d70346ac10a2f983
SHA15eaceb9038eb87114107e27a8faac08df0c9b721
SHA25667d995eb9fb4841f35c65391e364b61e5b9054dec581b97247af384e0322d0c4
SHA512649f6511a3cef5ba73cdf5a0f187caca18c23983c3ee4a9c9f4f049fadaf27002b95597a87d00c205a42f3cc91e3c1b87b3916e6887878aa7fbcca0502d5d01c