Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 20:42
Static task
static1
Behavioral task
behavioral1
Sample
faded72e559fc28a11d74a3f499df3f3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
faded72e559fc28a11d74a3f499df3f3.exe
Resource
win10v2004-20240226-en
General
-
Target
faded72e559fc28a11d74a3f499df3f3.exe
-
Size
205KB
-
MD5
faded72e559fc28a11d74a3f499df3f3
-
SHA1
aad9220deb05a228b141fbc5fbbece8b8e31c599
-
SHA256
f6276dea425167bc7f697638a405bc0ceaab1c04a7a44170a3bdbce33df44895
-
SHA512
4d432c3ccb6d95b1d49cb3adc09fefff339d226a0e1da42b92c1e544707660408e7dd3e78588961d42d4793b83bc0bec11fdb212c9135c9d2be000ec1385875f
-
SSDEEP
1536:6vVte+DYkayZ+OttmxKLjWlSA8Zp5JAOjGSHoWRsmhZLgY:6vVt6ka8+OtAcKlSRz5ZHoWn3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation faded72e559fc28a11d74a3f499df3f3.exe -
Executes dropped EXE 1 IoCs
pid Process 456 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\eb44349c\jusched.exe faded72e559fc28a11d74a3f499df3f3.exe File created C:\Program Files (x86)\eb44349c\eb44349c faded72e559fc28a11d74a3f499df3f3.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job faded72e559fc28a11d74a3f499df3f3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2196 456 WerFault.exe 93 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5036 wrote to memory of 456 5036 faded72e559fc28a11d74a3f499df3f3.exe 93 PID 5036 wrote to memory of 456 5036 faded72e559fc28a11d74a3f499df3f3.exe 93 PID 5036 wrote to memory of 456 5036 faded72e559fc28a11d74a3f499df3f3.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\faded72e559fc28a11d74a3f499df3f3.exe"C:\Users\Admin\AppData\Local\Temp\faded72e559fc28a11d74a3f499df3f3.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files (x86)\eb44349c\jusched.exe"C:\Program Files (x86)\eb44349c\jusched.exe"2⤵
- Executes dropped EXE
PID:456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 3963⤵
- Program crash
PID:2196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 456 -ip 4561⤵PID:3476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD515f3f184665e35a758e7161153a9cf03
SHA148fda52e34eea141d0dc2e49c8c625732b54c98d
SHA25631720558d78138778197b3e05dd883c24aa07a0d8fe5a4f6aa751a765a5ad882
SHA512a111cd4616b39c5607c3e1428acfc40bb3a97debdf6b4be0794b4fd9b2439f76e4df90932e3b5357926ce4f9cc32353682d5483da49aac8ec13761fbc48acddd