Analysis
-
max time kernel
118s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2024, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
d29e2523e21d22745f1e68cacb12a930N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d29e2523e21d22745f1e68cacb12a930N.exe
Resource
win10v2004-20240802-en
General
-
Target
d29e2523e21d22745f1e68cacb12a930N.exe
-
Size
237KB
-
MD5
d29e2523e21d22745f1e68cacb12a930
-
SHA1
c81595f65d4e7e8ff87a188fe2552d6a30b75c47
-
SHA256
87180287c9eaf65a1365f9eb1c637f4959a010b2f234155744de74068f8e54bc
-
SHA512
4ad103d03387e00e23b29f0870432813a6d9ddba0cca29e2822bb18e7e1d0c07e5808c5149b9cbd56d14b7b449a07c0a27551d35c1e25b8d4170b5bb0009a549
-
SSDEEP
6144:ZA2P27yTAnKGw0hjFhSR/W1nyAJ9v0pMtRCpYQ:ZATuTAnKGwUAWVycQqgj
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4212 4204 WerFault.exe 99 3060 1004 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d29e2523e21d22745f1e68cacb12a930N.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1004 d29e2523e21d22745f1e68cacb12a930N.exe 1004 d29e2523e21d22745f1e68cacb12a930N.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3500 Explorer.EXE Token: SeCreatePagefilePrivilege 3500 Explorer.EXE Token: SeShutdownPrivilege 3500 Explorer.EXE Token: SeCreatePagefilePrivilege 3500 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4204 winver.exe 1004 d29e2523e21d22745f1e68cacb12a930N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3500 Explorer.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1004 wrote to memory of 4204 1004 d29e2523e21d22745f1e68cacb12a930N.exe 99 PID 1004 wrote to memory of 4204 1004 d29e2523e21d22745f1e68cacb12a930N.exe 99 PID 1004 wrote to memory of 4204 1004 d29e2523e21d22745f1e68cacb12a930N.exe 99 PID 1004 wrote to memory of 4204 1004 d29e2523e21d22745f1e68cacb12a930N.exe 99 PID 4204 wrote to memory of 3500 4204 winver.exe 56 PID 1004 wrote to memory of 3500 1004 d29e2523e21d22745f1e68cacb12a930N.exe 56 PID 1004 wrote to memory of 2796 1004 d29e2523e21d22745f1e68cacb12a930N.exe 49
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2796
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\d29e2523e21d22745f1e68cacb12a930N.exe"C:\Users\Admin\AppData\Local\Temp\d29e2523e21d22745f1e68cacb12a930N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 3004⤵
- Program crash
PID:4212
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1004 -s 8843⤵
- Program crash
PID:3060
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Modifies data under HKEY_USERS
PID:2376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4204 -ip 42041⤵PID:2192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1004 -ip 10041⤵PID:4740