Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 02:05

General

  • Target

    e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe

  • Size

    1.4MB

  • MD5

    7ccb3c07bf2918bbcad959e27e17f083

  • SHA1

    978f8c090da4173cdf2544b38b5e53aa6fc2fab7

  • SHA256

    e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388

  • SHA512

    22d2552eb839a9643cd939acf70501b91a933b44c29fda7ccfc1bf5c3b1da44229e87dca3177424c23d30b61f76cead0dcd2c25bced77cc141a5ebd6f29c56cc

  • SSDEEP

    24576:1qDEvCTbMWu7rQYlBQcBiT6rprG8aGM8k0V0F0t0Kta4Plh3:1TvC/MTQYxsWR7aGM8Nt0aXd

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe
    "C:\Users\Admin\AppData\Local\Temp\e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4392
    • C:\Users\Admin\AppData\Local\directory\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Users\Admin\AppData\Local\Temp\e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe"
        3⤵
          PID:3504
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 688
          3⤵
          • Program crash
          PID:684
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1044 -ip 1044
      1⤵
        PID:3744

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\nonsubmerged

        Filesize

        28KB

        MD5

        5e6859127c5512b93d242e69968504f2

        SHA1

        60f72690bcfb2d2d0abcab606b7dc6df16976f26

        SHA256

        02719b524b7ad3a5ee7d5812b3165cbdcce3f33463f75fd4282074549914b443

        SHA512

        77da1ba3121320240112ccc3c1a56535e010bc59113f19da9655074d7a32798644ef6f432f8445cab5d56d59c3fdc949b17c2bcee229542910634f1a778917b3

      • C:\Users\Admin\AppData\Local\Temp\ophiolatrous

        Filesize

        265KB

        MD5

        53cb22f6455800a3ba89dad4e91d8ab7

        SHA1

        7c15e05820248e34c0f339adf7fd4d0065cda14e

        SHA256

        c3bf329a7a6d009dde75bfdee126473a9e498ce8246c7196717465cc90d243ea

        SHA512

        50b93d0292c5ca0d4bb976cbcb1713d0d4bcceb5eb0de5b9487a826ccb018082729c3c3cf87fa634699e7e03ee2f8cfdd977d774248ffdaf11f37b2c066a3b14

      • C:\Users\Admin\AppData\Local\directory\svchost.exe

        Filesize

        1.4MB

        MD5

        7ccb3c07bf2918bbcad959e27e17f083

        SHA1

        978f8c090da4173cdf2544b38b5e53aa6fc2fab7

        SHA256

        e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388

        SHA512

        22d2552eb839a9643cd939acf70501b91a933b44c29fda7ccfc1bf5c3b1da44229e87dca3177424c23d30b61f76cead0dcd2c25bced77cc141a5ebd6f29c56cc

      • memory/4392-11-0x00000000035F0000-0x00000000035F4000-memory.dmp

        Filesize

        16KB