Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 17:42
Static task
static1
Behavioral task
behavioral1
Sample
77fa451708d26a3f3ed7f8e8cd448a5d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
77fa451708d26a3f3ed7f8e8cd448a5d.exe
Resource
win10v2004-20231222-en
General
-
Target
77fa451708d26a3f3ed7f8e8cd448a5d.exe
-
Size
1.1MB
-
MD5
77fa451708d26a3f3ed7f8e8cd448a5d
-
SHA1
dbb910ce9121220c4baae79884ebfbf7ce86e632
-
SHA256
8ade2070b8a527d59b2ab9c16de81449f368f286b7a826ee33f2182701cf7447
-
SHA512
344e8b4d2544499882bab0d933777b0b4380cde8640288d0084989bbd42eb29093bb2f0a916b2585608197af17d7f817176c50433a16c396f0d31830e1aa95a1
-
SSDEEP
24576:lUXvfNa2/Bjq8y+DtBkRollGQdKnWYwP1Am6xoaF+0OHB4XY513Vd0ZkA:lq/B+8yiDllEQA+uy/hHBOY51ekA
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 35 2020 rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 77fa451708d26a3f3ed7f8e8cd448a5d.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 2488 e585946.exe -
Loads dropped DLL 2 IoCs
pid Process 2020 rundll32.exe 2020 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5484 2488 WerFault.exe 98 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5016 wrote to memory of 2020 5016 77fa451708d26a3f3ed7f8e8cd448a5d.exe 87 PID 5016 wrote to memory of 2020 5016 77fa451708d26a3f3ed7f8e8cd448a5d.exe 87 PID 5016 wrote to memory of 2020 5016 77fa451708d26a3f3ed7f8e8cd448a5d.exe 87 PID 2020 wrote to memory of 2488 2020 rundll32.exe 98 PID 2020 wrote to memory of 2488 2020 rundll32.exe 98 PID 2020 wrote to memory of 2488 2020 rundll32.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\77fa451708d26a3f3ed7f8e8cd448a5d.exe"C:\Users\Admin\AppData\Local\Temp\77fa451708d26a3f3ed7f8e8cd448a5d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\JWSQ16.z sxsC2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\e585946.exe"C:\Users\Admin\AppData\Local\Temp\e585946.exe"3⤵
- Executes dropped EXE
PID:2488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2488 -s 8044⤵
- Program crash
PID:5484
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2488 -ip 24881⤵PID:1780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5371f44551edf257371a2ab7e70ef9bfd
SHA16dad5ae9d0cca8bc9d2d8cb76e8cdd4d7384f375
SHA256680264905bcd27b0629bfe6b506c1ba2f2239c94636900f9ddc22e34372cbde4
SHA5120ef3c23108e16828f5fb7aee61bd32278d9ed8c0ff3330f51f713604948382745b75d014d807d82f484cde03989a3f97e7639983754006b8bae1ebb8074710b7
-
Filesize
21KB
MD5858939a54a0406e5be7220b92b6eb2b3
SHA1da24c0b6f723a74a8ec59e58c9c0aea3e86b7109
SHA256a30f30a109cb78d5eb1969f6c13f01a1e0a5f07b7ad8b133f5d2616223c1ce0a
SHA5128875d1e43ea59314695747796894a2f171e92f7b04024dbc529af1497331489e279cd06ea03061288089d2f07ad437178b9d62f0bae2e16ae0b95c5681569401