Analysis
-
max time kernel
118s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
35bb48e85b36f11fbf5fd42845983ce0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
35bb48e85b36f11fbf5fd42845983ce0N.exe
Resource
win10v2004-20240802-en
General
-
Target
35bb48e85b36f11fbf5fd42845983ce0N.exe
-
Size
225KB
-
MD5
35bb48e85b36f11fbf5fd42845983ce0
-
SHA1
7ce9b5e1bdd166dcf0cc4545854f47ab5e2cb976
-
SHA256
3e5bfe0ca8f353e91e3f84bff969a9490e5edc381a96213a83d717f3dcfb9591
-
SHA512
40bd015aac479d902e9fc86acc38006b8cbacbf7c9dcd4a57643ce3d9bdb0102aef129fd89828f3666d79290322951239c3b5c8967bbf242424ef6b9471d08ef
-
SSDEEP
6144:AA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:AATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 724 1532 WerFault.exe 99 3780 2420 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35bb48e85b36f11fbf5fd42845983ce0N.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2420 35bb48e85b36f11fbf5fd42845983ce0N.exe 2420 35bb48e85b36f11fbf5fd42845983ce0N.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3476 Explorer.EXE Token: SeCreatePagefilePrivilege 3476 Explorer.EXE Token: SeShutdownPrivilege 3476 Explorer.EXE Token: SeCreatePagefilePrivilege 3476 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1532 winver.exe 2420 35bb48e85b36f11fbf5fd42845983ce0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3476 Explorer.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1532 2420 35bb48e85b36f11fbf5fd42845983ce0N.exe 99 PID 2420 wrote to memory of 1532 2420 35bb48e85b36f11fbf5fd42845983ce0N.exe 99 PID 2420 wrote to memory of 1532 2420 35bb48e85b36f11fbf5fd42845983ce0N.exe 99 PID 2420 wrote to memory of 1532 2420 35bb48e85b36f11fbf5fd42845983ce0N.exe 99 PID 1532 wrote to memory of 3476 1532 winver.exe 55 PID 2420 wrote to memory of 3476 2420 35bb48e85b36f11fbf5fd42845983ce0N.exe 55 PID 2420 wrote to memory of 2532 2420 35bb48e85b36f11fbf5fd42845983ce0N.exe 42
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2532
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\35bb48e85b36f11fbf5fd42845983ce0N.exe"C:\Users\Admin\AppData\Local\Temp\35bb48e85b36f11fbf5fd42845983ce0N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 3004⤵
- Program crash
PID:724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 9323⤵
- Program crash
PID:3780
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Modifies data under HKEY_USERS
PID:412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1532 -ip 15321⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2420 -ip 24201⤵PID:4984