Analysis
-
max time kernel
108s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
6a925ab9f71f60bacd16489dd4bcacf0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6a925ab9f71f60bacd16489dd4bcacf0N.exe
Resource
win10v2004-20240704-en
General
-
Target
6a925ab9f71f60bacd16489dd4bcacf0N.exe
-
Size
912KB
-
MD5
6a925ab9f71f60bacd16489dd4bcacf0
-
SHA1
3a10180c9c0672ef707ac2e8faf3291d80c4587c
-
SHA256
3c422c18f2fe532db8859501296ff7948783967385a8386c0666405da3fe42fa
-
SHA512
e9be935e6c9f139b0ecbafbf2b41a27ffb7af617cd33d9642d7c96fc766a9636f7af8e7630391e3440f34a1a8ef6615083545db7a44e99ce956b5f6df3d22064
-
SSDEEP
12288:ky644dWZUOSWHo7yae0sYjVDa/ZS9anFY:k24dUFfPaoOa/ZSUnK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4068 6a925ab9f71f60bacd16489dd4bcacf0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4068 6a925ab9f71f60bacd16489dd4bcacf0N.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 2164 4088 WerFault.exe 82 5000 4068 WerFault.exe 90 2996 4068 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a925ab9f71f60bacd16489dd4bcacf0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4088 6a925ab9f71f60bacd16489dd4bcacf0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4068 6a925ab9f71f60bacd16489dd4bcacf0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4088 wrote to memory of 4068 4088 6a925ab9f71f60bacd16489dd4bcacf0N.exe 90 PID 4088 wrote to memory of 4068 4088 6a925ab9f71f60bacd16489dd4bcacf0N.exe 90 PID 4088 wrote to memory of 4068 4088 6a925ab9f71f60bacd16489dd4bcacf0N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a925ab9f71f60bacd16489dd4bcacf0N.exe"C:\Users\Admin\AppData\Local\Temp\6a925ab9f71f60bacd16489dd4bcacf0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 3442⤵
- Program crash
PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\6a925ab9f71f60bacd16489dd4bcacf0N.exeC:\Users\Admin\AppData\Local\Temp\6a925ab9f71f60bacd16489dd4bcacf0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 3523⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 4003⤵
- Program crash
PID:2996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4088 -ip 40881⤵PID:2704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4068 -ip 40681⤵PID:4652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4068 -ip 40681⤵PID:2632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
912KB
MD5ccb70354b8c80638424288dcff82e7d8
SHA170126c173b77e32de1d9f780fd73326562381838
SHA256bf9e6bb420c90f117dd50487c583d2366e857764e630087682efcdaece67aa45
SHA512787b107b4942a91d27e2157932ce3b08898adaeb3c59a9a31dab80d84eaf00bee1919b6e5afd1e749facd70b3e48f192e69243013c8f0192cb1295ac357613e4