Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
c11c9b16027b5adad180c1c914da8f63.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c11c9b16027b5adad180c1c914da8f63.exe
Resource
win10v2004-20240226-en
General
-
Target
c11c9b16027b5adad180c1c914da8f63.exe
-
Size
84KB
-
MD5
c11c9b16027b5adad180c1c914da8f63
-
SHA1
b9eb799b22d7a04e8ac42dc0c717c8e86a19bc60
-
SHA256
ddfbb2bf78a6381347096940229c669c6dac02039ff79bcd0a978e8549ed52ce
-
SHA512
316dd779b36fd9ee86842a856661aaa08bd0bf382ef96e7d0d3c8a7bfd8ccff9e3dd699402916c0925acef35029af640e9f9200f899cf6aba813f576226eb8fa
-
SSDEEP
1536:aeo5iKxOtyS9DanycPgfT72aGntbSp+Qrh53/KCY3L3RiAfLiZaK+Q:G4Kxb8DMdPgfxGntbSp+Qr33/VefLib
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation c11c9b16027b5adad180c1c914da8f63.exe -
Executes dropped EXE 1 IoCs
pid Process 1676 wmplayer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4324 1692 WerFault.exe 83 4392 1676 WerFault.exe 97 -
Runs net.exe
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1692 wrote to memory of 3148 1692 c11c9b16027b5adad180c1c914da8f63.exe 88 PID 1692 wrote to memory of 3148 1692 c11c9b16027b5adad180c1c914da8f63.exe 88 PID 1692 wrote to memory of 3148 1692 c11c9b16027b5adad180c1c914da8f63.exe 88 PID 3148 wrote to memory of 1416 3148 net.exe 92 PID 3148 wrote to memory of 1416 3148 net.exe 92 PID 3148 wrote to memory of 1416 3148 net.exe 92 PID 1692 wrote to memory of 1676 1692 c11c9b16027b5adad180c1c914da8f63.exe 97 PID 1692 wrote to memory of 1676 1692 c11c9b16027b5adad180c1c914da8f63.exe 97 PID 1692 wrote to memory of 1676 1692 c11c9b16027b5adad180c1c914da8f63.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\c11c9b16027b5adad180c1c914da8f63.exe"C:\Users\Admin\AppData\Local\Temp\c11c9b16027b5adad180c1c914da8f63.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\windows\SysWOW64\net.exe"C:\windows\system32\net.exe" stop wscsvc2⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc3⤵PID:1416
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 7082⤵
- Program crash
PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\wmplayer.exe"C:\Users\Admin\AppData\Local\Temp\wmplayer.exe"2⤵
- Executes dropped EXE
PID:1676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1676 -s 2203⤵
- Program crash
PID:4392
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1692 -ip 16921⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1676 -ip 16761⤵PID:4736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5796f1254eb92978880dac1ec62e7ca69
SHA173709e36983d71b0d78a3b36995fb2dc6c8e6ccb
SHA256739155526e4c1534ab322762b5f84f8c1f974872cea622f4477cec886f267aa9
SHA512c18e352c22c68f64d120cce3b679d5cadf47186331005eb9167019c08e77f3545a196ffb19a72a5ce66d34269df937d4eee235bfa6f1366a56352a328a59bbca