Analysis

  • max time kernel
    93s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 06:53

General

  • Target

    8639dedd763106aa21cff174358af1ae.exe

  • Size

    747KB

  • MD5

    8639dedd763106aa21cff174358af1ae

  • SHA1

    498fb1baa5b7a4ef1df5e00a43e14736f38cc58d

  • SHA256

    f0e39aac3ca37182e28d619b0787cff87db14d730c7808c2ad663e861648bce6

  • SHA512

    5e5f49fc7d94e1c9e9cca94fc3cdfecb40b73a21aac98806872e73ed05dee3b0f32040aac1a309429d767fbd699ccf3578bc043cb2f5df1b29b858ac39c475a4

  • SSDEEP

    12288:LH6Ix534d4CdWxJ8SqDd0qL70fTOw6NF3Z4mxxPPbYMYkSeFfiscHKLD4:LH1x53O4IWAM+aywmQmXPPbzFhyKLs

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8639dedd763106aa21cff174358af1ae.exe
    "C:\Users\Admin\AppData\Local\Temp\8639dedd763106aa21cff174358af1ae.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\program files\common files\microsoft shared\msinfo\Server.exe
      "C:\program files\common files\microsoft shared\msinfo\Server.exe"
      2⤵
      • Executes dropped EXE
      PID:3552
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 524
        3⤵
        • Program crash
        PID:1504
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3552 -ip 3552
    1⤵
      PID:3780

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Common Files\microsoft shared\MSInfo\Server.exe

      Filesize

      743KB

      MD5

      d354c51f0ce5d2e94c6507e13442eeb5

      SHA1

      6519f92b7d5a9583fbce04b333ba72df129d77a5

      SHA256

      1ff13ba53178b4dce39b6a9561c150fa8950a42c879121914c2453fe73c63ab3

      SHA512

      fe620ea50d90287e28a9fb2238bb73656fffe8bd0f19b16a3df1016622668e5f1ad5cbb182f361ad19acb194fd03993a9795af6bb782e45e94d3dd4e4e310f29

    • memory/1012-26-0x00000000025A0000-0x00000000025A1000-memory.dmp

      Filesize

      4KB

    • memory/1012-36-0x0000000003510000-0x0000000003511000-memory.dmp

      Filesize

      4KB

    • memory/1012-3-0x0000000002460000-0x0000000002461000-memory.dmp

      Filesize

      4KB

    • memory/1012-11-0x00000000034F0000-0x00000000034F1000-memory.dmp

      Filesize

      4KB

    • memory/1012-10-0x00000000024A0000-0x00000000024A1000-memory.dmp

      Filesize

      4KB

    • memory/1012-12-0x00000000024D0000-0x00000000024D1000-memory.dmp

      Filesize

      4KB

    • memory/1012-19-0x0000000002560000-0x0000000002561000-memory.dmp

      Filesize

      4KB

    • memory/1012-31-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1012-30-0x00000000034D0000-0x00000000034D5000-memory.dmp

      Filesize

      20KB

    • memory/1012-29-0x0000000003560000-0x0000000003561000-memory.dmp

      Filesize

      4KB

    • memory/1012-28-0x0000000003530000-0x0000000003531000-memory.dmp

      Filesize

      4KB

    • memory/1012-27-0x0000000002610000-0x0000000002611000-memory.dmp

      Filesize

      4KB

    • memory/1012-38-0x0000000003550000-0x0000000003551000-memory.dmp

      Filesize

      4KB

    • memory/1012-37-0x0000000003500000-0x0000000003501000-memory.dmp

      Filesize

      4KB

    • memory/1012-0-0x0000000000400000-0x000000000052C000-memory.dmp

      Filesize

      1.2MB

    • memory/1012-35-0x0000000003520000-0x0000000003521000-memory.dmp

      Filesize

      4KB

    • memory/1012-34-0x00000000006E0000-0x00000000006E1000-memory.dmp

      Filesize

      4KB

    • memory/1012-33-0x00000000006D0000-0x00000000006D1000-memory.dmp

      Filesize

      4KB

    • memory/1012-2-0x0000000002490000-0x0000000002491000-memory.dmp

      Filesize

      4KB

    • memory/1012-32-0x0000000003570000-0x0000000003571000-memory.dmp

      Filesize

      4KB

    • memory/1012-18-0x00000000024F0000-0x00000000024F1000-memory.dmp

      Filesize

      4KB

    • memory/1012-24-0x00000000025E0000-0x00000000025E1000-memory.dmp

      Filesize

      4KB

    • memory/1012-23-0x0000000002600000-0x0000000002601000-memory.dmp

      Filesize

      4KB

    • memory/1012-22-0x0000000002510000-0x0000000002511000-memory.dmp

      Filesize

      4KB

    • memory/1012-21-0x0000000002580000-0x0000000002581000-memory.dmp

      Filesize

      4KB

    • memory/1012-25-0x00000000025C0000-0x00000000025C1000-memory.dmp

      Filesize

      4KB

    • memory/1012-17-0x0000000002500000-0x0000000002501000-memory.dmp

      Filesize

      4KB

    • memory/1012-16-0x0000000002570000-0x0000000002571000-memory.dmp

      Filesize

      4KB

    • memory/1012-15-0x0000000002520000-0x0000000002521000-memory.dmp

      Filesize

      4KB

    • memory/1012-14-0x0000000002540000-0x0000000002541000-memory.dmp

      Filesize

      4KB

    • memory/1012-20-0x0000000002550000-0x0000000002551000-memory.dmp

      Filesize

      4KB

    • memory/1012-13-0x00000000034E0000-0x00000000034E2000-memory.dmp

      Filesize

      8KB

    • memory/1012-9-0x00000000024B0000-0x00000000024B1000-memory.dmp

      Filesize

      4KB

    • memory/1012-8-0x00000000022D0000-0x00000000022D1000-memory.dmp

      Filesize

      4KB

    • memory/1012-5-0x00000000022E0000-0x00000000022E1000-memory.dmp

      Filesize

      4KB

    • memory/1012-4-0x00000000024C0000-0x00000000024C1000-memory.dmp

      Filesize

      4KB

    • memory/1012-1-0x00000000022F0000-0x0000000002344000-memory.dmp

      Filesize

      336KB

    • memory/1012-49-0x00000000022F0000-0x0000000002344000-memory.dmp

      Filesize

      336KB

    • memory/1012-48-0x0000000000400000-0x000000000052C000-memory.dmp

      Filesize

      1.2MB

    • memory/3552-50-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB