Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 03:54
Static task
static1
Behavioral task
behavioral1
Sample
df97654d5646c4b709d5267e2160e8c0399288b62378b64b9cbc81ab667a8c82.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
df97654d5646c4b709d5267e2160e8c0399288b62378b64b9cbc81ab667a8c82.exe
Resource
win10v2004-20240802-en
General
-
Target
df97654d5646c4b709d5267e2160e8c0399288b62378b64b9cbc81ab667a8c82.exe
-
Size
61KB
-
MD5
a18ce4e28bb6d6601d6b5c36c4f8c3c0
-
SHA1
0f47e99afec7a13439b9291d862e5b437c610840
-
SHA256
df97654d5646c4b709d5267e2160e8c0399288b62378b64b9cbc81ab667a8c82
-
SHA512
2fe7949bc01762ae725006854bb0a8a933333bb1445555b2a0f012eb27847f073acd475fd21a221597fd45289ee20d0383d37fb29eda6556fe8cacf04cf61352
-
SSDEEP
768:peJIvFKPZo2smEasjcj29NWngAHxcwKppEaxglaX5uA:pQIvEPZo6Ead29NQgA2wzle5
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3920 ewiuer2.exe 904 ewiuer2.exe 4172 ewiuer2.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe File opened for modification C:\Windows\SysWOW64\viesazm.mpk ewiuer2.exe File created C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe File opened for modification C:\Windows\SysWOW64\viesazm.mpk ewiuer2.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewiuer2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df97654d5646c4b709d5267e2160e8c0399288b62378b64b9cbc81ab667a8c82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewiuer2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewiuer2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4772 wrote to memory of 3920 4772 df97654d5646c4b709d5267e2160e8c0399288b62378b64b9cbc81ab667a8c82.exe 83 PID 4772 wrote to memory of 3920 4772 df97654d5646c4b709d5267e2160e8c0399288b62378b64b9cbc81ab667a8c82.exe 83 PID 4772 wrote to memory of 3920 4772 df97654d5646c4b709d5267e2160e8c0399288b62378b64b9cbc81ab667a8c82.exe 83 PID 3920 wrote to memory of 904 3920 ewiuer2.exe 89 PID 3920 wrote to memory of 904 3920 ewiuer2.exe 89 PID 3920 wrote to memory of 904 3920 ewiuer2.exe 89 PID 904 wrote to memory of 4172 904 ewiuer2.exe 91 PID 904 wrote to memory of 4172 904 ewiuer2.exe 91 PID 904 wrote to memory of 4172 904 ewiuer2.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\df97654d5646c4b709d5267e2160e8c0399288b62378b64b9cbc81ab667a8c82.exe"C:\Users\Admin\AppData\Local\Temp\df97654d5646c4b709d5267e2160e8c0399288b62378b64b9cbc81ab667a8c82.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Roaming\ewiuer2.exeC:\Users\Admin\AppData\Roaming\ewiuer2.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\ewiuer2.exeC:\Windows\System32\ewiuer2.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\ewiuer2.exeC:\Windows\SysWOW64\ewiuer2.exe /nomove4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4172
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5a8c42a5805266698ce43123ae5e21135
SHA129c5dd2e1b0b2bbc52f521466dcc8bc01be41515
SHA256142519ba711765d2b78499ac18a10937c160f079cd31ade023b1373ccea4fddd
SHA5127270c42331edcefdcb33a70045a23fe0613fcb057575ca9d6da721462f6c8b74ce6c91edc38ff1ba25f6b31ed8355f8710c092cb62bf800bfc72522913ea3475
-
Filesize
61KB
MD53396581eabcd14f6a8a1281c02b8444b
SHA1ab47d3a16c271accef87ebf6cc1f8d8347e02454
SHA2561657c199973f25d0283f750e072d5926c72937e7de305fa7019755e5c79a963c
SHA512d679707bf9114527e70b7d8b45ed52340581eaf287b173c83b5027fb425202d2367bfe4bb53149f5c6f09d1984d79adb929f62728e74004ccc8420690ccbbcec