Overview
overview
7Static
static
312455fe4e2...37.exe
windows7-x64
712455fe4e2...37.exe
windows10-2004-x64
7$PLUGINSDI...re.dll
windows7-x64
1$PLUGINSDI...re.dll
windows10-2004-x64
1$PLUGINSDI...ms.dll
windows7-x64
1$PLUGINSDI...ms.dll
windows10-2004-x64
1$PLUGINSDI...pf.dll
windows7-x64
1$PLUGINSDI...pf.dll
windows10-2004-x64
1$PLUGINSDI...le.exe
windows7-x64
1$PLUGINSDI...le.exe
windows10-2004-x64
1$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
12455fe4e26fb673dd9a0a1f375404572c8537954c85da189c75e3091c804737.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
12455fe4e26fb673dd9a0a1f375404572c8537954c85da189c75e3091c804737.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Microsoft.Web.WebView2.Core.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/Unmanageable.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/Unmanageable.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/WebView2Loader.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/WebView2Loader.dll
Resource
win10v2004-20240709-en
General
-
Target
12455fe4e26fb673dd9a0a1f375404572c8537954c85da189c75e3091c804737.exe
-
Size
271KB
-
MD5
ca029c9bf8427345cec5d37c9557d6c6
-
SHA1
6d4b456a2b5cdcb0cc624c803d71dae2bde91859
-
SHA256
12455fe4e26fb673dd9a0a1f375404572c8537954c85da189c75e3091c804737
-
SHA512
b587bea8dca5b64fb6be04f0619cfa264fdd8482169c8ee8ed538083a0a42f80e50d978092c932b1f3fee1c68b87e78e05a23b1050af771bd45659751e24c9ff
-
SSDEEP
6144:wGpoYkk4prY3yIuvrhVgSV/aPj2iiibLmQOYKYQkvA0:wGmkRYv1VgS/AZ9OYUkA0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2904 Unmanageable.exe -
Loads dropped DLL 1 IoCs
pid Process 3028 12455fe4e26fb673dd9a0a1f375404572c8537954c85da189c75e3091c804737.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12455fe4e26fb673dd9a0a1f375404572c8537954c85da189c75e3091c804737.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2904 3028 12455fe4e26fb673dd9a0a1f375404572c8537954c85da189c75e3091c804737.exe 30 PID 3028 wrote to memory of 2904 3028 12455fe4e26fb673dd9a0a1f375404572c8537954c85da189c75e3091c804737.exe 30 PID 3028 wrote to memory of 2904 3028 12455fe4e26fb673dd9a0a1f375404572c8537954c85da189c75e3091c804737.exe 30 PID 3028 wrote to memory of 2904 3028 12455fe4e26fb673dd9a0a1f375404572c8537954c85da189c75e3091c804737.exe 30 PID 2904 wrote to memory of 2680 2904 Unmanageable.exe 31 PID 2904 wrote to memory of 2680 2904 Unmanageable.exe 31 PID 2904 wrote to memory of 2680 2904 Unmanageable.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\12455fe4e26fb673dd9a0a1f375404572c8537954c85da189c75e3091c804737.exe"C:\Users\Admin\AppData\Local\Temp\12455fe4e26fb673dd9a0a1f375404572c8537954c85da189c75e3091c804737.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\nsy66CF.tmp\Unmanageable.exeC:\Users\Admin\AppData\Local\Temp\nsy66CF.tmp\Unmanageable.exe ""2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2904 -s 5803⤵PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5acffd20af7fd815bc432fdae7046ea1e
SHA12ba44ebb36869d7c3a286507493d61d2474158a9
SHA256bd25c89994a977347eefd06d1ba2ccede3777a3c717e8a70a2a623bcf653e5ed
SHA512998455b131437d2ffbc4a429787beb1327e8356496c52efef9907c08bed38093e7889f1e318560176e01ccc36f1b4372c242bd4db0b3a079b83c62bbe8f3c04d