Analysis

  • max time kernel
    96s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 22:30

General

  • Target

    634233e57c1536876fab51bb4410375897aed30634cf72bd4aba4625a0fb1709.exe

  • Size

    749KB

  • MD5

    8e1b0a3e6f307506671a7b0a3ef10ac6

  • SHA1

    d058ad9a176290d1b54208142c7d3291f8add355

  • SHA256

    634233e57c1536876fab51bb4410375897aed30634cf72bd4aba4625a0fb1709

  • SHA512

    b7b7301c77ba4d0ac8f6b67ebed140b6c0ed1f0b4c8186fec1cdbce88886fe53599bfe247aef0f76432de8b594640f512e968298d4ce182898cb42992f3e959f

  • SSDEEP

    12288:7tKe6Zv23YLVFhBsC8iFHs+hsuQXIQVRpVnl3Bg5oiNIr2NU9DLWDNH3kTRH/GU:v6Zv2ivhBVnFvh5Q44+iisNLwHsOU

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\634233e57c1536876fab51bb4410375897aed30634cf72bd4aba4625a0fb1709.exe
    "C:\Users\Admin\AppData\Local\Temp\634233e57c1536876fab51bb4410375897aed30634cf72bd4aba4625a0fb1709.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    PID:1896
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1896 -s 744
      2⤵
      • Program crash
      PID:3616
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1896 -ip 1896
    1⤵
      PID:4716

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\concp32.exe

            Filesize

            756KB

            MD5

            c6fb414d7c199eff7c7c70d14a6214d4

            SHA1

            bd5e2b3a7e3dcff1313f9da09364352a55adb56f

            SHA256

            4716b4c1c202ffb04f66cec64d7837e299343345a0d83fd6de120a363c665bee

            SHA512

            a80d92c8f830c4424b3806c467ac6f5a8360e9463acde634eb291ff222e53dd21fabf803060167440d935a8e711da8e04e3456b528d27f5e08cf2ff537c8e172

          • memory/1896-0-0x0000000000400000-0x0000000000439000-memory.dmp

            Filesize

            228KB

          • memory/1896-7-0x0000000000400000-0x0000000000439000-memory.dmp

            Filesize

            228KB