Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-08-2024 19:29

General

  • Target

    1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe

  • Size

    264KB

  • MD5

    fd601e2605ed4308c7bb0e1e2aab7070

  • SHA1

    0579ebbb0704e2ace3875134416e5b47b6152ced

  • SHA256

    1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049

  • SHA512

    e4f2653f715e6e2b5e35e6fb49fd30c56ebc95eee65e2b58d3ee1c71d269cf1024b60e29b0ff98f66d7953bdc5d88e45223dac8bd59623bdd42a5e0f4c39e77d

  • SSDEEP

    6144:ARi6tbPx0bVp0/VxWwsohxd2Quohdbd0zscwIGUKfvUJ43ewmxteZekR+1b/KVCD:K/RxdzZdxGwsYI

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe
    "C:\Users\Admin\AppData\Local\Temp\1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Windows\SysWOW64\Dmllipeg.exe
      C:\Windows\system32\Dmllipeg.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2172
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 404
        3⤵
        • Program crash
        PID:3964
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2172 -ip 2172
    1⤵
      PID:4920

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      264KB

      MD5

      8ffb657a20b003eaa5b557a22e68789a

      SHA1

      57396daffd9ac7848c6ea1097a752981e2f2269d

      SHA256

      daf94da136e1607ee7ff4ee70678a8923afd7812be5f30b6b4687e69f9b1e682

      SHA512

      8faeeaa528602a239905d4027e4daaec0657abcb96b6ce5fd2a97835fae2024026f7cfd734581b8495772b9fbe8c3d853f37f878ddd53c0ebfdce8df2899440e

    • memory/436-0-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/436-1-0x0000000000431000-0x0000000000432000-memory.dmp

      Filesize

      4KB

    • memory/436-13-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2172-8-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2172-11-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB