Analysis
-
max time kernel
93s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 06:59
Static task
static1
Behavioral task
behavioral1
Sample
80cd67986684d107cdf1914d29a87690N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
80cd67986684d107cdf1914d29a87690N.exe
Resource
win10v2004-20240802-en
General
-
Target
80cd67986684d107cdf1914d29a87690N.exe
-
Size
1.2MB
-
MD5
80cd67986684d107cdf1914d29a87690
-
SHA1
6362dc53f5a5db46b69eb3776682019ad4bbcc9a
-
SHA256
d0abaa35c76252cabae51788bbf34354221ed75bd4202dc5928f7b865ad3a55b
-
SHA512
d22a5d671fe5785adfe9df58d7e59f4e442d0e1acc495a227edd7d64b8f4936f097678a78b7d52d76186c4de622d2451fae7e41758943114c868d386c889a630
-
SSDEEP
24576:V3ZomX+wvVvESa/ZSkJovBYLYsSwdaJ+4I:VJomX+0vESg+I
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2228 80cd67986684d107cdf1914d29a87690N.exe -
Executes dropped EXE 1 IoCs
pid Process 2228 80cd67986684d107cdf1914d29a87690N.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3432 2928 WerFault.exe 82 4760 2228 WerFault.exe 90 4400 2228 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80cd67986684d107cdf1914d29a87690N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2928 80cd67986684d107cdf1914d29a87690N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2228 80cd67986684d107cdf1914d29a87690N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2228 2928 80cd67986684d107cdf1914d29a87690N.exe 90 PID 2928 wrote to memory of 2228 2928 80cd67986684d107cdf1914d29a87690N.exe 90 PID 2928 wrote to memory of 2228 2928 80cd67986684d107cdf1914d29a87690N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\80cd67986684d107cdf1914d29a87690N.exe"C:\Users\Admin\AppData\Local\Temp\80cd67986684d107cdf1914d29a87690N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 3442⤵
- Program crash
PID:3432
-
-
C:\Users\Admin\AppData\Local\Temp\80cd67986684d107cdf1914d29a87690N.exeC:\Users\Admin\AppData\Local\Temp\80cd67986684d107cdf1914d29a87690N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 3523⤵
- Program crash
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 1523⤵
- Program crash
PID:4400
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2928 -ip 29281⤵PID:2016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2228 -ip 22281⤵PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2228 -ip 22281⤵PID:3320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD51cb3c4d9b86682a8e62d595af04210dd
SHA146fc2a489f91866f780eb7c7f2f604ed62588048
SHA256c1a9851df70ecf0a7dc54f6264c87b29aa24cba8c182b727f298aa2d15f57665
SHA512ed6dcdd94abadf0f0e1fea8231b5a0f5509baa0c22b6ea3fb6e6e5c47a6f45e4a2d7a7a2f377f5fe2f1060ec4a6701717f93a547b8cb111e13af83893494a622