Analysis

  • max time kernel
    137s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 16:52

General

  • Target

    c11c9b16027b5adad180c1c914da8f63.exe

  • Size

    84KB

  • MD5

    c11c9b16027b5adad180c1c914da8f63

  • SHA1

    b9eb799b22d7a04e8ac42dc0c717c8e86a19bc60

  • SHA256

    ddfbb2bf78a6381347096940229c669c6dac02039ff79bcd0a978e8549ed52ce

  • SHA512

    316dd779b36fd9ee86842a856661aaa08bd0bf382ef96e7d0d3c8a7bfd8ccff9e3dd699402916c0925acef35029af640e9f9200f899cf6aba813f576226eb8fa

  • SSDEEP

    1536:aeo5iKxOtyS9DanycPgfT72aGntbSp+Qrh53/KCY3L3RiAfLiZaK+Q:G4Kxb8DMdPgfxGntbSp+Qr33/VefLib

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Runs net.exe
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c11c9b16027b5adad180c1c914da8f63.exe
    "C:\Users\Admin\AppData\Local\Temp\c11c9b16027b5adad180c1c914da8f63.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\windows\SysWOW64\net.exe
      "C:\windows\system32\net.exe" stop wscsvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3148
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop wscsvc
        3⤵
          PID:1416
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 708
        2⤵
        • Program crash
        PID:4324
      • C:\Users\Admin\AppData\Local\Temp\wmplayer.exe
        "C:\Users\Admin\AppData\Local\Temp\wmplayer.exe"
        2⤵
        • Executes dropped EXE
        PID:1676
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1676 -s 220
          3⤵
          • Program crash
          PID:4392
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1692 -ip 1692
      1⤵
        PID:4892
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1676 -ip 1676
        1⤵
          PID:4736

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\wmplayer.exe

                Filesize

                53KB

                MD5

                796f1254eb92978880dac1ec62e7ca69

                SHA1

                73709e36983d71b0d78a3b36995fb2dc6c8e6ccb

                SHA256

                739155526e4c1534ab322762b5f84f8c1f974872cea622f4477cec886f267aa9

                SHA512

                c18e352c22c68f64d120cce3b679d5cadf47186331005eb9167019c08e77f3545a196ffb19a72a5ce66d34269df937d4eee235bfa6f1366a56352a328a59bbca

              • memory/1676-8-0x0000000013140000-0x000000001318B000-memory.dmp

                Filesize

                300KB