Analysis
-
max time kernel
104s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2024 18:51
Static task
static1
Behavioral task
behavioral1
Sample
f7917b89aa12f4ca825d85e4ac7c3a4992c879b5157c32d9bdbe862e0d4b6e61.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f7917b89aa12f4ca825d85e4ac7c3a4992c879b5157c32d9bdbe862e0d4b6e61.exe
Resource
win10v2004-20231215-en
General
-
Target
f7917b89aa12f4ca825d85e4ac7c3a4992c879b5157c32d9bdbe862e0d4b6e61.exe
-
Size
257KB
-
MD5
77a2c14f3cbbf8de36d71ec71a2b5db9
-
SHA1
271fc7d87a641d20fd062506f1b0dfe66157bdea
-
SHA256
f7917b89aa12f4ca825d85e4ac7c3a4992c879b5157c32d9bdbe862e0d4b6e61
-
SHA512
bb04ae4861b2974ee5ca10f2a01d299acfe161f38f4be7ac8ef5ca03525ea7cc581f4f812b077abcf7f7592a187ead487cbb6723b050469cf9755590ac8dd92a
-
SSDEEP
3072:r0EVXyKVxntSV+P94EhS+43bh78L+ps1XxMu/3wLaTm+tDLgaRyZY+6W/cHQX5dy:FiSfiXLh7vy15waTJLQq+6W/cH6N
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation f7917b89aa12f4ca825d85e4ac7c3a4992c879b5157c32d9bdbe862e0d4b6e61.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 3196 3272 WerFault.exe 66 4972 3272 WerFault.exe 66 3824 3272 WerFault.exe 66 320 3272 WerFault.exe 66 224 3272 WerFault.exe 66 3748 3272 WerFault.exe 66 4248 3272 WerFault.exe 66 4948 3272 WerFault.exe 66 -
Kills process with taskkill 1 IoCs
pid Process 4404 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4404 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3272 wrote to memory of 2028 3272 f7917b89aa12f4ca825d85e4ac7c3a4992c879b5157c32d9bdbe862e0d4b6e61.exe 101 PID 3272 wrote to memory of 2028 3272 f7917b89aa12f4ca825d85e4ac7c3a4992c879b5157c32d9bdbe862e0d4b6e61.exe 101 PID 3272 wrote to memory of 2028 3272 f7917b89aa12f4ca825d85e4ac7c3a4992c879b5157c32d9bdbe862e0d4b6e61.exe 101 PID 2028 wrote to memory of 4404 2028 cmd.exe 105 PID 2028 wrote to memory of 4404 2028 cmd.exe 105 PID 2028 wrote to memory of 4404 2028 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7917b89aa12f4ca825d85e4ac7c3a4992c879b5157c32d9bdbe862e0d4b6e61.exe"C:\Users\Admin\AppData\Local\Temp\f7917b89aa12f4ca825d85e4ac7c3a4992c879b5157c32d9bdbe862e0d4b6e61.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 7482⤵
- Program crash
PID:3196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 7402⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 7402⤵
- Program crash
PID:3824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 7482⤵
- Program crash
PID:320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 8842⤵
- Program crash
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 10002⤵
- Program crash
PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 13522⤵
- Program crash
PID:4248
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "f7917b89aa12f4ca825d85e4ac7c3a4992c879b5157c32d9bdbe862e0d4b6e61.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\f7917b89aa12f4ca825d85e4ac7c3a4992c879b5157c32d9bdbe862e0d4b6e61.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "f7917b89aa12f4ca825d85e4ac7c3a4992c879b5157c32d9bdbe862e0d4b6e61.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 13722⤵
- Program crash
PID:4948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3272 -ip 32721⤵PID:2032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3272 -ip 32721⤵PID:1932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3272 -ip 32721⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3272 -ip 32721⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3272 -ip 32721⤵PID:4172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3272 -ip 32721⤵PID:4936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3272 -ip 32721⤵PID:4552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3272 -ip 32721⤵PID:3344