Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2024 09:07

General

  • Target

    96ca1cd7e5ab84dfc0f92908120fc104.exe

  • Size

    43KB

  • MD5

    96ca1cd7e5ab84dfc0f92908120fc104

  • SHA1

    a740d3bd3435a14dd2873c7b665e5be0cc08f08b

  • SHA256

    942110272510a43eed52302413287bd08b446fa7da50cc76b7414ce3bafe26a2

  • SHA512

    09a7c7f65e644f65fa2d8beadc8db87f3c110d77a299574236cfaa0f396b0a3f7b0e5e3db466432ffaba7540c97cce2f5a66787e1380b31d780fc8ff5a74f15c

  • SSDEEP

    768:bCKqDQStlBJ1p+j5ZXFKS34WVuyuMJreKYwjJMQ26AzuN8q8:eKqDQi7c5ZXFKCKjKYQsuI

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96ca1cd7e5ab84dfc0f92908120fc104.exe
    "C:\Users\Admin\AppData\Local\Temp\96ca1cd7e5ab84dfc0f92908120fc104.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:524
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c date 2005-10-31
      2⤵
        PID:1216
      • C:\Windows\SysWOW64\LL.exe
        C:\Windows\system32\LL.exe
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:4664
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c date 2005-10-31
          3⤵
            PID:2104
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 660
            3⤵
            • Program crash
            PID:1228
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 560
          2⤵
          • Program crash
          PID:3620
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 524 -ip 524
        1⤵
          PID:1408
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4664 -ip 4664
          1⤵
            PID:4264

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\LL.exe

            Filesize

            43KB

            MD5

            96ca1cd7e5ab84dfc0f92908120fc104

            SHA1

            a740d3bd3435a14dd2873c7b665e5be0cc08f08b

            SHA256

            942110272510a43eed52302413287bd08b446fa7da50cc76b7414ce3bafe26a2

            SHA512

            09a7c7f65e644f65fa2d8beadc8db87f3c110d77a299574236cfaa0f396b0a3f7b0e5e3db466432ffaba7540c97cce2f5a66787e1380b31d780fc8ff5a74f15c

          • memory/524-0-0x0000000000400000-0x0000000000411200-memory.dmp

            Filesize

            68KB

          • memory/524-7-0x0000000000400000-0x0000000000411200-memory.dmp

            Filesize

            68KB

          • memory/4664-6-0x0000000000400000-0x0000000000411200-memory.dmp

            Filesize

            68KB

          • memory/4664-8-0x0000000000400000-0x0000000000411200-memory.dmp

            Filesize

            68KB

          • memory/4664-9-0x0000000000400000-0x0000000000411200-memory.dmp

            Filesize

            68KB