Analysis
-
max time kernel
107s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
74e0f8a50075882064c50b08e5e00d40N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
74e0f8a50075882064c50b08e5e00d40N.exe
Resource
win10v2004-20240802-en
General
-
Target
74e0f8a50075882064c50b08e5e00d40N.exe
-
Size
209KB
-
MD5
74e0f8a50075882064c50b08e5e00d40
-
SHA1
c8c27df9ec18ed807361fa89af7731534cc6f09f
-
SHA256
17c62bc41a822f5dd58927d24d3324250c35460ee2f6be1f8df451754e252152
-
SHA512
1a1a0cc0646d22208a059226197f0e8a72c15c3c596f04245f65b31d0307d4bea17e543b9b31f39c898f6a98cc831fb07a855ce4d6ddb4cafdf2e496161f291c
-
SSDEEP
3072:wfuFC5KKpprXuX+nawmEz5uhSro5Q06xAYdj66tYy/9wMuPfCuWefXZV+s:xfX+nawX5z85XYk6igXuXtfXp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 220 74e0f8a50075882064c50b08e5e00d40N.exe -
Executes dropped EXE 1 IoCs
pid Process 220 74e0f8a50075882064c50b08e5e00d40N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4020 2924 WerFault.exe 83 2040 220 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74e0f8a50075882064c50b08e5e00d40N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2924 74e0f8a50075882064c50b08e5e00d40N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 220 74e0f8a50075882064c50b08e5e00d40N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2924 wrote to memory of 220 2924 74e0f8a50075882064c50b08e5e00d40N.exe 90 PID 2924 wrote to memory of 220 2924 74e0f8a50075882064c50b08e5e00d40N.exe 90 PID 2924 wrote to memory of 220 2924 74e0f8a50075882064c50b08e5e00d40N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\74e0f8a50075882064c50b08e5e00d40N.exe"C:\Users\Admin\AppData\Local\Temp\74e0f8a50075882064c50b08e5e00d40N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 3962⤵
- Program crash
PID:4020
-
-
C:\Users\Admin\AppData\Local\Temp\74e0f8a50075882064c50b08e5e00d40N.exeC:\Users\Admin\AppData\Local\Temp\74e0f8a50075882064c50b08e5e00d40N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 3643⤵
- Program crash
PID:2040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2924 -ip 29241⤵PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 220 -ip 2201⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD547a6bf8755a125563f126222d1459f5a
SHA1d7ae6f9a623a981972564045fcc95a5aa7215905
SHA2560f35aec42615f2b8a9541facbd2008573dd81b509bc70d960aac6186bd523f2d
SHA512d0e00b56c50863e1409acb368c4b7cc71a4880ba6d6674c7d19184b7e13bce4120057b5f55892e5f76d6587d5965d2b6b6ce129ce2b7cda43cdaf291f21ded4e