Analysis
-
max time kernel
94s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
a096dd92ca9684e80bcf8b2530e49c10N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a096dd92ca9684e80bcf8b2530e49c10N.exe
Resource
win10v2004-20240802-en
General
-
Target
a096dd92ca9684e80bcf8b2530e49c10N.exe
-
Size
384KB
-
MD5
a096dd92ca9684e80bcf8b2530e49c10
-
SHA1
d7ec45661d59fad857af276110e706908cf95dd4
-
SHA256
a6f71e058a091390f220c648c1fb8c52d8be65d9eb5de10774e2f454e0991f08
-
SHA512
fa57db36e7c9c56919bfa92aa24872f246b0f54b46d820378027d86e23e04047687bd27fa3714f40ab1aa4ee8e20ea421b1aa1b146a61da13d578a7ef8158505
-
SSDEEP
6144:WP97ytYLMkMgmEpgxWdDJboY4sJ9pALL7j11:WEgmUgx6D9d9pAX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4324 a096dd92ca9684e80bcf8b2530e49c10N.exe -
Executes dropped EXE 1 IoCs
pid Process 4324 a096dd92ca9684e80bcf8b2530e49c10N.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 852 5032 WerFault.exe 83 4400 4324 WerFault.exe 90 5076 4324 WerFault.exe 90 4600 4324 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a096dd92ca9684e80bcf8b2530e49c10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a096dd92ca9684e80bcf8b2530e49c10N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5032 a096dd92ca9684e80bcf8b2530e49c10N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4324 a096dd92ca9684e80bcf8b2530e49c10N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5032 wrote to memory of 4324 5032 a096dd92ca9684e80bcf8b2530e49c10N.exe 90 PID 5032 wrote to memory of 4324 5032 a096dd92ca9684e80bcf8b2530e49c10N.exe 90 PID 5032 wrote to memory of 4324 5032 a096dd92ca9684e80bcf8b2530e49c10N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\a096dd92ca9684e80bcf8b2530e49c10N.exe"C:\Users\Admin\AppData\Local\Temp\a096dd92ca9684e80bcf8b2530e49c10N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 3842⤵
- Program crash
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\a096dd92ca9684e80bcf8b2530e49c10N.exeC:\Users\Admin\AppData\Local\Temp\a096dd92ca9684e80bcf8b2530e49c10N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:4324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 3523⤵
- Program crash
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 7683⤵
- Program crash
PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 7883⤵
- Program crash
PID:4600
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5032 -ip 50321⤵PID:2780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4324 -ip 43241⤵PID:1780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4324 -ip 43241⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4324 -ip 43241⤵PID:824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD546476c871d8b6b71fe6e78cc28f5f793
SHA1eb127a1d80beb7343bb65890ca8f63455ff3f9be
SHA2562c6da658f126a78f1bcc6b81cd6a7a2b6d617f32d0733d0e0a7dc6e99ef60734
SHA51276031c760def946e9f0d28d16cd5512b0f8374f19846bc41dca7135d0564846fc7d9c27931098784b1358d805ec9807832f111114ac9fb75ac48088974e4cfd1