Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 21:14

General

  • Target

    3b01e02df49900bb02e88a7c96f5c9518d844b27aa5caae08d8253fc799f98fe.exe

  • Size

    640KB

  • MD5

    72fdbefe95f181a5f2dc9b6e193938e5

  • SHA1

    1a1c24725589be7708afb7915d88ac92ee1b83d0

  • SHA256

    3b01e02df49900bb02e88a7c96f5c9518d844b27aa5caae08d8253fc799f98fe

  • SHA512

    fc0c9d7ae8126a994641513c0a52df76e66b1b19ee5572d6ff3f3a86098b0ad797a33db1ded62906a7c52e2f8b31d596fa4d514740c91e3cee29a30ac5e1d011

  • SSDEEP

    12288:f2aIAlY9He9htX0vVy90kCWhVQ5zCD4TyWN9VysX7ryTk2osi9:f27Alm+9htEhjWhVQ5zY4xN9VyUUkV19

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b01e02df49900bb02e88a7c96f5c9518d844b27aa5caae08d8253fc799f98fe.exe
    "C:\Users\Admin\AppData\Local\Temp\3b01e02df49900bb02e88a7c96f5c9518d844b27aa5caae08d8253fc799f98fe.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 396
      2⤵
      • Program crash
      PID:740
    • C:\Users\Admin\AppData\Local\Temp\3b01e02df49900bb02e88a7c96f5c9518d844b27aa5caae08d8253fc799f98fe.exe
      C:\Users\Admin\AppData\Local\Temp\3b01e02df49900bb02e88a7c96f5c9518d844b27aa5caae08d8253fc799f98fe.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1516
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 364
        3⤵
        • Program crash
        PID:1060
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2836 -ip 2836
    1⤵
      PID:1152
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1516 -ip 1516
      1⤵
        PID:4516

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\3b01e02df49900bb02e88a7c96f5c9518d844b27aa5caae08d8253fc799f98fe.exe

        Filesize

        640KB

        MD5

        cbda57e9b97e99d50ceeb4fba7b45418

        SHA1

        db93ebd475c8a2ef6cc0b4528546d0f4cf2f2320

        SHA256

        32e2e50c3b1994d11435125b902a485aa67d55929dba79682c97964280635c28

        SHA512

        67750df9e217f3057d21c387b70e396843135963c5715802a8ef9cf19615426e41c1892494e484280ec7a0f67dd754254f069859e8e21d01cc45e8fc1f8b144e

      • memory/1516-6-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/1516-13-0x0000000004DC0000-0x0000000004E06000-memory.dmp

        Filesize

        280KB

      • memory/1516-8-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/1516-14-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/2836-0-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/2836-7-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB