Analysis
-
max time kernel
138s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 06:44
Static task
static1
Behavioral task
behavioral1
Sample
cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe
Resource
win10v2004-20240508-en
General
-
Target
cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe
-
Size
6.9MB
-
MD5
120d23a3e154eb643eff9ca4617941d7
-
SHA1
f3f6b7a0510b146b16521fa2ea4ddaf81302c136
-
SHA256
cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441
-
SHA512
0b80dc7effa92d0af6dd79f9ce577d5d458c7cbfa7fcd2990f5c746f64795d070625e9c335726e6f08b8e3a0e0601e7a82d9db5e4476c5e4b34f6a632795e9d9
-
SSDEEP
196608:2xLe/IYmnsr9IYgcKFWAUv/bG98CyImPmiHu:oq/dmfY2rUE8CS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5068 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe 5052 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3800 5068 WerFault.exe 83 4752 5052 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5068 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe 5068 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe 5068 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe 5068 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe 5052 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe 5052 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe 5052 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe 5052 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5068 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe 5068 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe 5052 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe 5052 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5068 wrote to memory of 5052 5068 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe 84 PID 5068 wrote to memory of 5052 5068 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe 84 PID 5068 wrote to memory of 5052 5068 cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe"C:\Users\Admin\AppData\Local\Temp\cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe"C:\Users\Admin\AppData\Local\Temp\cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe" 16535322⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 6923⤵
- Program crash
PID:4752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 14482⤵
- Program crash
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5068 -ip 50681⤵PID:860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5052 -ip 50521⤵PID:2140