Analysis

  • max time kernel
    139s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 21:49

General

  • Target

    642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe

  • Size

    78KB

  • MD5

    adac3c9737360cb44ba585eee7b90b5b

  • SHA1

    f971e51785ef4c3ff6faabc24c1fb88368779320

  • SHA256

    642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702

  • SHA512

    5bd8ce73a42ab2c6c5a2d7690354bd92f43f267d81740667576d6a63fdc8f923b6fe881a0e18b8f34a3562f63abbd0a829c0128fb0cf5dea77aba7e9674dd380

  • SSDEEP

    1536:NtE267gRhvZsnc6kDsYoACX6HdOiVQRN+zL20gJi1ie:bBfhtDFnCq9OiVmgzL20WKt

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe
    "C:\Users\Admin\AppData\Local\Temp\642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Windows\SysWOW64\Fkkeclfh.exe
      C:\Windows\system32\Fkkeclfh.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2188
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 396
        3⤵
        • Program crash
        PID:4940
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 400
        3⤵
        • Program crash
        PID:4464
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2188 -ip 2188
    1⤵
      PID:3512
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2188 -ip 2188
      1⤵
        PID:2292

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\Fkkeclfh.exe

        Filesize

        78KB

        MD5

        c19240975db77be2e6f8cc74a3b73b90

        SHA1

        1746bdf65ca21e4791ca5c65a981a76df96df4a2

        SHA256

        5adf5d5ead3e49a9bf5da089bc878e7178c02b015d95cbd4b34b4fac9857fce8

        SHA512

        055bc69c9089a8b038f616c5c2d2829b301c0b7e952b17efdcf20577a8a2d9ad66fa1f6723eb6461c73a382edaa7d474e789176c8fd480ae4826c702c648ee1c

      • memory/2188-8-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2188-10-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2644-0-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2644-1-0x0000000000431000-0x0000000000432000-memory.dmp

        Filesize

        4KB

      • memory/2644-11-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB