Analysis
-
max time kernel
105s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
1e2f8c757b1357431d8cfcd5d36481e0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1e2f8c757b1357431d8cfcd5d36481e0N.exe
Resource
win10v2004-20240709-en
General
-
Target
1e2f8c757b1357431d8cfcd5d36481e0N.exe
-
Size
320KB
-
MD5
1e2f8c757b1357431d8cfcd5d36481e0
-
SHA1
634c9c952dba7288dc3e456ed8a3803ffbaa91ea
-
SHA256
9091835de75b38a106727cccd62922b7c14827537f97c06c1398ee4ac84f175e
-
SHA512
86162bc400c56aa908196fc246a14b2604785f4088ee26fa5ecc8644b105ebc24e28eedc0df7e202848a3887f261e42751cacf6416c142c0a16d2547841355a3
-
SSDEEP
6144:CBfuAT6RAmD0OgyXdWw24HCRXnkjHqQbG1B7qV40saiigCD1:CBfup+mwOh24HCRKHqQbG1BmVQ5zCD1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3984 1e2f8c757b1357431d8cfcd5d36481e0N.exe -
Executes dropped EXE 1 IoCs
pid Process 3984 1e2f8c757b1357431d8cfcd5d36481e0N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3196 3028 WerFault.exe 83 1620 3984 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e2f8c757b1357431d8cfcd5d36481e0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3028 1e2f8c757b1357431d8cfcd5d36481e0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3984 1e2f8c757b1357431d8cfcd5d36481e0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3028 wrote to memory of 3984 3028 1e2f8c757b1357431d8cfcd5d36481e0N.exe 91 PID 3028 wrote to memory of 3984 3028 1e2f8c757b1357431d8cfcd5d36481e0N.exe 91 PID 3028 wrote to memory of 3984 3028 1e2f8c757b1357431d8cfcd5d36481e0N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e2f8c757b1357431d8cfcd5d36481e0N.exe"C:\Users\Admin\AppData\Local\Temp\1e2f8c757b1357431d8cfcd5d36481e0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 3962⤵
- Program crash
PID:3196
-
-
C:\Users\Admin\AppData\Local\Temp\1e2f8c757b1357431d8cfcd5d36481e0N.exeC:\Users\Admin\AppData\Local\Temp\1e2f8c757b1357431d8cfcd5d36481e0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 3643⤵
- Program crash
PID:1620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3028 -ip 30281⤵PID:2064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3984 -ip 39841⤵PID:4160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD558f21c645999c5e8d2563a5b4bbe54b3
SHA19ff46d3c3e7a55e08af94feb636a0fc4a02e33fa
SHA2561a67d1e82d79fdfd5bb6b29d26f62624edfb5d0d3fe0716a8113c4856f48f8b9
SHA512bfd49f4e898976d95f4e283421ca6698fa964d3cda79ceae413d19164f98aaba8d1bb130b513378db72d3a933041a2588c6348a8434b6266a5c83087f07e0f9e