Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 15:04

General

  • Target

    a3f5986c1d660037698463a3a66d9360N.exe

  • Size

    968KB

  • MD5

    a3f5986c1d660037698463a3a66d9360

  • SHA1

    e88316b1a099bea21df9c25be9a87c2bbcc9f02d

  • SHA256

    2348b49f723e80bb2a22050a4a5a17a9ec7847cb0a6871f4cfaf2d61a3461a07

  • SHA512

    cb541f1024ac5757145890ca1ad828a0dc04604448a5ca11f8d1b813b40d1d59948159e7db1dcb6833592db5a147d47572daafb68d96b297b7da99c8e21be2cd

  • SSDEEP

    24576:v6Zv2ivhBVnFys7xP86Lh7uhmh8VZ7i/+XAmvYSFdbRPIbgRrgW:vE2ivhQs7dLNuhmuVZ7iHmv5FJRIqZ

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3f5986c1d660037698463a3a66d9360N.exe
    "C:\Users\Admin\AppData\Local\Temp\a3f5986c1d660037698463a3a66d9360N.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    PID:2924
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 704
      2⤵
      • Program crash
      PID:4336
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2924 -ip 2924
    1⤵
      PID:3036

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\concp32.exe

            Filesize

            974KB

            MD5

            01e52bb83bd1f5e843c61a925c1408ae

            SHA1

            12cc454468a3fb2875fd1c43f046d0b157b58877

            SHA256

            2ec2fc36a3a9b0205d428ccd1776548428408b2929d436c64184162369d2ba49

            SHA512

            d62e2a6a120cc23cd8f7409f7f9e20b40f7f00f37334a77b10a35163b59e4b82329978b01180fa8d591445159d75f18918d17a0084b56b1001262b3ee4012258

          • memory/2924-0-0x0000000000400000-0x0000000000439000-memory.dmp

            Filesize

            228KB

          • memory/2924-7-0x0000000000400000-0x0000000000439000-memory.dmp

            Filesize

            228KB