Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe
Resource
win10v2004-20240730-en
General
-
Target
14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe
-
Size
6.8MB
-
MD5
45c2cbb28e1894d6df1318c09622bfb4
-
SHA1
12b8c3a64fbb30735add0224cd99b97dcef84a15
-
SHA256
14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4
-
SHA512
8f700dc6ca4b10802c4c010b34b6fc42da2a9b681215c22d938d66efc14060a6f81ae11e75c348a07851b737497b86d07a53d5356e3fc0540b52db5574761305
-
SSDEEP
196608:DOZ3h28qGHHC3h9Lgk4qPJp0GgvCIAQ4c:DOZ388P6h90k4EZgvCm4c
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4528 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 4528 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe 4528 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe 4528 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2256 4528 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4528 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe 4528 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe 4528 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe 4528 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4528 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe"C:\Users\Admin\AppData\Local\Temp\14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 9762⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4528 -ip 45281⤵PID:1956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f8fe70559cb9a40b0a89a330ed351102
SHA10a07d7f60ae84b14e5b906a4ab55fe62faa43b3f
SHA2561779b0ece6932d78a00f2fdf7bd89cbe0239bb5cf2ba224ea0c46736ad3ad2a5
SHA5123c5c104b56c6d8e494ca3cc2cfd7a5eed4a2a38dbad0740d35e45227063ca7dcf8efb92a67dee14da2b3a36f40d6a048fd2d1f1d002c65c301625217d32202d3