Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 06:59
Static task
static1
Behavioral task
behavioral1
Sample
80cd67986684d107cdf1914d29a87690N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
80cd67986684d107cdf1914d29a87690N.exe
Resource
win10v2004-20240802-en
General
-
Target
80cd67986684d107cdf1914d29a87690N.exe
-
Size
1.2MB
-
MD5
80cd67986684d107cdf1914d29a87690
-
SHA1
6362dc53f5a5db46b69eb3776682019ad4bbcc9a
-
SHA256
d0abaa35c76252cabae51788bbf34354221ed75bd4202dc5928f7b865ad3a55b
-
SHA512
d22a5d671fe5785adfe9df58d7e59f4e442d0e1acc495a227edd7d64b8f4936f097678a78b7d52d76186c4de622d2451fae7e41758943114c868d386c889a630
-
SSDEEP
24576:V3ZomX+wvVvESa/ZSkJovBYLYsSwdaJ+4I:VJomX+0vESg+I
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3016 80cd67986684d107cdf1914d29a87690N.exe -
Executes dropped EXE 1 IoCs
pid Process 3016 80cd67986684d107cdf1914d29a87690N.exe -
Loads dropped DLL 4 IoCs
pid Process 1712 80cd67986684d107cdf1914d29a87690N.exe 2864 WerFault.exe 2864 WerFault.exe 2864 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2864 3016 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80cd67986684d107cdf1914d29a87690N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80cd67986684d107cdf1914d29a87690N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1712 80cd67986684d107cdf1914d29a87690N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3016 80cd67986684d107cdf1914d29a87690N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1712 wrote to memory of 3016 1712 80cd67986684d107cdf1914d29a87690N.exe 32 PID 1712 wrote to memory of 3016 1712 80cd67986684d107cdf1914d29a87690N.exe 32 PID 1712 wrote to memory of 3016 1712 80cd67986684d107cdf1914d29a87690N.exe 32 PID 1712 wrote to memory of 3016 1712 80cd67986684d107cdf1914d29a87690N.exe 32 PID 3016 wrote to memory of 2864 3016 80cd67986684d107cdf1914d29a87690N.exe 33 PID 3016 wrote to memory of 2864 3016 80cd67986684d107cdf1914d29a87690N.exe 33 PID 3016 wrote to memory of 2864 3016 80cd67986684d107cdf1914d29a87690N.exe 33 PID 3016 wrote to memory of 2864 3016 80cd67986684d107cdf1914d29a87690N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\80cd67986684d107cdf1914d29a87690N.exe"C:\Users\Admin\AppData\Local\Temp\80cd67986684d107cdf1914d29a87690N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\80cd67986684d107cdf1914d29a87690N.exeC:\Users\Admin\AppData\Local\Temp\80cd67986684d107cdf1914d29a87690N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:2864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD54af5147d0a6decef139fdf162acb5c56
SHA1d99692aeb5041c1ba5a84d47b44bfb4b69bda35b
SHA2560e9315a0f9ba8be7c5a5b8f1631f92925bb9ae58c5b25f92fd332dc574194797
SHA512aa6cf1a2a9f714cc7dc34f0ba2e9524411e9adcf7dfa1284ea182ab147c8a6491ddb7d792ba9d71f4a874961386f1987405ca58c9b9b6cf4284626254dd30463