Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe
Resource
win10v2004-20240802-en
General
-
Target
c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe
-
Size
2.0MB
-
MD5
c5ca191ca4bcb6ccf9bc4ec4e8068ad0
-
SHA1
aa94f38c74717550a62c364a4d0303655ac8634f
-
SHA256
f899ba0544bacc7489d1888143d6e774b2704bab76e080b6274291ec1c2e0c38
-
SHA512
6f38fdceb53d1138bdfdb4a4735e6b1fb3240ea63c53da3d9df92a1402083426b7abbf6e581189c655944fb5936adcb9efd829c5de6795d9115a1fb34cea7863
-
SSDEEP
12288:ireCT5Rhoqcst+0n2oD7UzPacRWGARfGAncbE9salEWXlPjVDa/ZSBHnhvMCtjS/:iNhoPg9a/ZSFue+zxa/ZSrJovBYz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2356 c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2356 c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe -
Loads dropped DLL 4 IoCs
pid Process 2280 c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2576 2356 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2280 c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2356 c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2356 2280 c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe 32 PID 2280 wrote to memory of 2356 2280 c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe 32 PID 2280 wrote to memory of 2356 2280 c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe 32 PID 2280 wrote to memory of 2356 2280 c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe 32 PID 2356 wrote to memory of 2576 2356 c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe 33 PID 2356 wrote to memory of 2576 2356 c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe 33 PID 2356 wrote to memory of 2576 2356 c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe 33 PID 2356 wrote to memory of 2576 2356 c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe"C:\Users\Admin\AppData\Local\Temp\c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exeC:\Users\Admin\AppData\Local\Temp\c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:2576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD53b6d8a744665086cbabfea0fc765609c
SHA16b5b7f88a504aae7f162d67f2244f7553ad41f9b
SHA256c5ff945738b1482691d919545ebeb7faa2d608e12a174580f849c4d6fbd94b0a
SHA512e8dfd5595e157cfe7561470b6df37b79a3f2daf36e69fb5469ac5d69ad6eb4133aa6e979705b94ca4d0ac95046dadc069f692ac29cf1acfcfa08b6e4e1d1c552