Analysis
-
max time kernel
101s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
484905425f1b5191c1effa0675e1db50N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
484905425f1b5191c1effa0675e1db50N.exe
Resource
win10v2004-20240802-en
General
-
Target
484905425f1b5191c1effa0675e1db50N.exe
-
Size
1.0MB
-
MD5
484905425f1b5191c1effa0675e1db50
-
SHA1
24566555a7bc5736f056fc6fb4d025c83b17c43d
-
SHA256
c8e7c634deb641d4d180dc801f581e752150359c44678aa4c91db29ab8f94a31
-
SHA512
2b7b0b63b378fe7bca25cb0d31fbc63ece4beed4b07e2c4eaa4dde23d59901deb46ff29e3866557bd58483bdae9ec8a079d84d1262017614b9943fc59ca07272
-
SSDEEP
12288:lpJjSEB8g+xPhCWuRjLVjlDa/ZSaniF+G4F:zMkCpCjXa/ZSaniF+d
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5024 484905425f1b5191c1effa0675e1db50N.exe -
Executes dropped EXE 1 IoCs
pid Process 5024 484905425f1b5191c1effa0675e1db50N.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3348 4552 WerFault.exe 83 4916 5024 WerFault.exe 91 2908 5024 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 484905425f1b5191c1effa0675e1db50N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4552 484905425f1b5191c1effa0675e1db50N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 5024 484905425f1b5191c1effa0675e1db50N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4552 wrote to memory of 5024 4552 484905425f1b5191c1effa0675e1db50N.exe 91 PID 4552 wrote to memory of 5024 4552 484905425f1b5191c1effa0675e1db50N.exe 91 PID 4552 wrote to memory of 5024 4552 484905425f1b5191c1effa0675e1db50N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\484905425f1b5191c1effa0675e1db50N.exe"C:\Users\Admin\AppData\Local\Temp\484905425f1b5191c1effa0675e1db50N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 3442⤵
- Program crash
PID:3348
-
-
C:\Users\Admin\AppData\Local\Temp\484905425f1b5191c1effa0675e1db50N.exeC:\Users\Admin\AppData\Local\Temp\484905425f1b5191c1effa0675e1db50N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 3523⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 3563⤵
- Program crash
PID:2908
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4552 -ip 45521⤵PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5024 -ip 50241⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 5024 -ip 50241⤵PID:636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5edf7322741f63e9bc6242d6ed9e74931
SHA187c5bbd1ced22f80a519c544675b8a5c2dd541ba
SHA2564b443cb72a1f6e5744bed7b9d99e62147ffa0d7a09c1567ba33dcb2c32bbbc2c
SHA51264642181b8be6d9dc533080a49ec41fb6cfe3ed8d8b787a5f48ed1e61cbdb1dad2f5ae190ea8bfd5e70aceb788724c4415392de5737bbe7d2dc19c3379390156