Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exe
Resource
win10v2004-20240730-en
General
-
Target
1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exe
-
Size
256KB
-
MD5
e83370e109e5f45345ce132e538cfc22
-
SHA1
ee399a691cae7aab9fd6eb90ac5f7797d937c8e6
-
SHA256
1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24
-
SHA512
00fc2cd3c4dfb0a25ac6e9f45ca09966648a2eb8c2668eae676612ba57cc6c308d209f852648283649057821fd2ea273fbb4843c0c7714858a0c9e78493e170b
-
SSDEEP
6144:jNFxufS6B29w0q83HVfu3vRZZ3jlbtvjzCnvzWMpWgP+v0W7cyqCxSngmMBqf7:ofIDH9AvRZZ3RbtvjzCnvzWMpWV50npX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3440 1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exe -
Executes dropped EXE 1 IoCs
pid Process 3440 1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 3128 3576 WerFault.exe 83 1916 3440 WerFault.exe 92 1288 3440 WerFault.exe 92 2920 3440 WerFault.exe 92 4072 3440 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3576 1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3440 1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3576 wrote to memory of 3440 3576 1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exe 92 PID 3576 wrote to memory of 3440 3576 1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exe 92 PID 3576 wrote to memory of 3440 3576 1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exe"C:\Users\Admin\AppData\Local\Temp\1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 3842⤵
- Program crash
PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exeC:\Users\Admin\AppData\Local\Temp\1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 3523⤵
- Program crash
PID:1916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 7683⤵
- Program crash
PID:1288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 8083⤵
- Program crash
PID:2920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 8163⤵
- Program crash
PID:4072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3576 -ip 35761⤵PID:1548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3440 -ip 34401⤵PID:1088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3440 -ip 34401⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3440 -ip 34401⤵PID:1124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3440 -ip 34401⤵PID:4428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1f31db117f35f3deb434329f28d1f54122e064bf4e403eadc562903c52c53d24.exe
Filesize256KB
MD5907f312ebe7eed3a89979f8d1ba6cbda
SHA1b2f5619692f30df0573cd41e16420c523a588c3e
SHA2562f52879e5273b422307d622870caf38b932eddc73a4a058ae08d32081ad720f5
SHA51234bc5dbdc6b3d567c7d3d6892208e1b723ab4609f07fa7c649bfd406779ed681ce073af42ef801c6e2e550d723ba3731e84f3600553935aa37d0f2cec05cf4d6