Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 02:05
Static task
static1
Behavioral task
behavioral1
Sample
e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe
Resource
win10v2004-20240709-en
General
-
Target
e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe
-
Size
1.4MB
-
MD5
7ccb3c07bf2918bbcad959e27e17f083
-
SHA1
978f8c090da4173cdf2544b38b5e53aa6fc2fab7
-
SHA256
e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388
-
SHA512
22d2552eb839a9643cd939acf70501b91a933b44c29fda7ccfc1bf5c3b1da44229e87dca3177424c23d30b61f76cead0dcd2c25bced77cc141a5ebd6f29c56cc
-
SSDEEP
24576:1qDEvCTbMWu7rQYlBQcBiT6rprG8aGM8k0V0F0t0Kta4Plh3:1TvC/MTQYxsWR7aGM8Nt0aXd
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.vbs svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 1044 svchost.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\directory\svchost.exe autoit_exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 684 1044 WerFault.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
svchost.exepid process 1044 svchost.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exesvchost.exepid process 4392 e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe 4392 e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe 4392 e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exesvchost.exepid process 4392 e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe 4392 e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe 4392 e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe 1044 svchost.exe 1044 svchost.exe 1044 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exesvchost.exedescription pid process target process PID 4392 wrote to memory of 1044 4392 e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe svchost.exe PID 4392 wrote to memory of 1044 4392 e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe svchost.exe PID 4392 wrote to memory of 1044 4392 e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe svchost.exe PID 1044 wrote to memory of 3504 1044 svchost.exe RegSvcs.exe PID 1044 wrote to memory of 3504 1044 svchost.exe RegSvcs.exe PID 1044 wrote to memory of 3504 1044 svchost.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe"C:\Users\Admin\AppData\Local\Temp\e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\directory\svchost.exe"C:\Users\Admin\AppData\Local\Temp\e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388.exe"3⤵PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 6883⤵
- Program crash
PID:684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1044 -ip 10441⤵PID:3744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD55e6859127c5512b93d242e69968504f2
SHA160f72690bcfb2d2d0abcab606b7dc6df16976f26
SHA25602719b524b7ad3a5ee7d5812b3165cbdcce3f33463f75fd4282074549914b443
SHA51277da1ba3121320240112ccc3c1a56535e010bc59113f19da9655074d7a32798644ef6f432f8445cab5d56d59c3fdc949b17c2bcee229542910634f1a778917b3
-
Filesize
265KB
MD553cb22f6455800a3ba89dad4e91d8ab7
SHA17c15e05820248e34c0f339adf7fd4d0065cda14e
SHA256c3bf329a7a6d009dde75bfdee126473a9e498ce8246c7196717465cc90d243ea
SHA51250b93d0292c5ca0d4bb976cbcb1713d0d4bcceb5eb0de5b9487a826ccb018082729c3c3cf87fa634699e7e03ee2f8cfdd977d774248ffdaf11f37b2c066a3b14
-
Filesize
1.4MB
MD57ccb3c07bf2918bbcad959e27e17f083
SHA1978f8c090da4173cdf2544b38b5e53aa6fc2fab7
SHA256e7413d14be16f0ef9d69ab606b79523851edce48ddb94d335388f6ef10bb6388
SHA51222d2552eb839a9643cd939acf70501b91a933b44c29fda7ccfc1bf5c3b1da44229e87dca3177424c23d30b61f76cead0dcd2c25bced77cc141a5ebd6f29c56cc