Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
8639dedd763106aa21cff174358af1ae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8639dedd763106aa21cff174358af1ae.exe
Resource
win10v2004-20231215-en
General
-
Target
8639dedd763106aa21cff174358af1ae.exe
-
Size
747KB
-
MD5
8639dedd763106aa21cff174358af1ae
-
SHA1
498fb1baa5b7a4ef1df5e00a43e14736f38cc58d
-
SHA256
f0e39aac3ca37182e28d619b0787cff87db14d730c7808c2ad663e861648bce6
-
SHA512
5e5f49fc7d94e1c9e9cca94fc3cdfecb40b73a21aac98806872e73ed05dee3b0f32040aac1a309429d767fbd699ccf3578bc043cb2f5df1b29b858ac39c475a4
-
SSDEEP
12288:LH6Ix534d4CdWxJ8SqDd0qL70fTOw6NF3Z4mxxPPbYMYkSeFfiscHKLD4:LH1x53O4IWAM+aywmQmXPPbzFhyKLs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 8639dedd763106aa21cff174358af1ae.exe -
Executes dropped EXE 1 IoCs
pid Process 3552 Server.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\program files\common files\microsoft shared\msinfo\Server.jpg 8639dedd763106aa21cff174358af1ae.exe File created C:\program files\common files\microsoft shared\msinfo\Azul.jpg 8639dedd763106aa21cff174358af1ae.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1504 3552 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1012 wrote to memory of 3552 1012 8639dedd763106aa21cff174358af1ae.exe 86 PID 1012 wrote to memory of 3552 1012 8639dedd763106aa21cff174358af1ae.exe 86 PID 1012 wrote to memory of 3552 1012 8639dedd763106aa21cff174358af1ae.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8639dedd763106aa21cff174358af1ae.exe"C:\Users\Admin\AppData\Local\Temp\8639dedd763106aa21cff174358af1ae.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\program files\common files\microsoft shared\msinfo\Server.exe"C:\program files\common files\microsoft shared\msinfo\Server.exe"2⤵
- Executes dropped EXE
PID:3552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 5243⤵
- Program crash
PID:1504
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3552 -ip 35521⤵PID:3780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
743KB
MD5d354c51f0ce5d2e94c6507e13442eeb5
SHA16519f92b7d5a9583fbce04b333ba72df129d77a5
SHA2561ff13ba53178b4dce39b6a9561c150fa8950a42c879121914c2453fe73c63ab3
SHA512fe620ea50d90287e28a9fb2238bb73656fffe8bd0f19b16a3df1016622668e5f1ad5cbb182f361ad19acb194fd03993a9795af6bb782e45e94d3dd4e4e310f29