Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
1423c37bb3f5412ff8829fbc99a55800N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1423c37bb3f5412ff8829fbc99a55800N.exe
Resource
win10v2004-20240709-en
General
-
Target
1423c37bb3f5412ff8829fbc99a55800N.exe
-
Size
1.2MB
-
MD5
1423c37bb3f5412ff8829fbc99a55800
-
SHA1
7f221cded7b7123d819d7d099ad2cf1670dadf5d
-
SHA256
d393efd44409614d3600a51d67f1842de04f5662c2bb3b756e0871fac5292d98
-
SHA512
95171e4ac04e294042ff7f28994355e1173e7d71dd9c397a8f0a5389e92be72741e738a08df6efae5605b5370cfc464557033a1f1d6a442b0b8e8a7e8f30aa77
-
SSDEEP
24576:99xB6oMksLWSk9a/ZSkJovBYLYsSwdaJ+4I:hdMksLTk9g+I
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1840 1423c37bb3f5412ff8829fbc99a55800N.exe -
Executes dropped EXE 1 IoCs
pid Process 1840 1423c37bb3f5412ff8829fbc99a55800N.exe -
Loads dropped DLL 4 IoCs
pid Process 2336 1423c37bb3f5412ff8829fbc99a55800N.exe 3024 WerFault.exe 3024 WerFault.exe 3024 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3024 1840 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1423c37bb3f5412ff8829fbc99a55800N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1423c37bb3f5412ff8829fbc99a55800N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2336 1423c37bb3f5412ff8829fbc99a55800N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1840 1423c37bb3f5412ff8829fbc99a55800N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1840 2336 1423c37bb3f5412ff8829fbc99a55800N.exe 32 PID 2336 wrote to memory of 1840 2336 1423c37bb3f5412ff8829fbc99a55800N.exe 32 PID 2336 wrote to memory of 1840 2336 1423c37bb3f5412ff8829fbc99a55800N.exe 32 PID 2336 wrote to memory of 1840 2336 1423c37bb3f5412ff8829fbc99a55800N.exe 32 PID 1840 wrote to memory of 3024 1840 1423c37bb3f5412ff8829fbc99a55800N.exe 33 PID 1840 wrote to memory of 3024 1840 1423c37bb3f5412ff8829fbc99a55800N.exe 33 PID 1840 wrote to memory of 3024 1840 1423c37bb3f5412ff8829fbc99a55800N.exe 33 PID 1840 wrote to memory of 3024 1840 1423c37bb3f5412ff8829fbc99a55800N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1423c37bb3f5412ff8829fbc99a55800N.exe"C:\Users\Admin\AppData\Local\Temp\1423c37bb3f5412ff8829fbc99a55800N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\1423c37bb3f5412ff8829fbc99a55800N.exeC:\Users\Admin\AppData\Local\Temp\1423c37bb3f5412ff8829fbc99a55800N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:3024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD501973931be3f3135abbb7814a8bd1f77
SHA107e2f01dabb2ebffcbc34c1c3c58f59883dbc73f
SHA2565e64d5916e45f6a42538547226b1773fe799e29e75681ca5e9f2711f92c24e9f
SHA5124321585c722ab6b6f16d1e8f599cbbc3271cf14ddd7907688b6e34ce48a2efe0075c195f88832b32e661db5d2f5508da2c4313742f609e07cc909ae8f002cc68