Analysis
-
max time kernel
106s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
74a9b936f7301f31a8ef4d8606522360N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
74a9b936f7301f31a8ef4d8606522360N.exe
Resource
win10v2004-20240802-en
General
-
Target
74a9b936f7301f31a8ef4d8606522360N.exe
-
Size
2.0MB
-
MD5
74a9b936f7301f31a8ef4d8606522360
-
SHA1
1fb668736b91990ee24294460a3777b91321a9aa
-
SHA256
ad215e510368e0d6d05f4a5a96d3eb2be5f9474ed3bc0f68c4bace02a87f1c99
-
SHA512
3304324d07ffdee648dc871bf76e3d8207761bf7ca909e9ea5684e2ceaec3b6e9b4633e6ed70e7c1af49324ef46c5ab061cb78cdbca7335474ca5775bd852abf
-
SSDEEP
12288:WQGyXSq93U8UlJxwgs75FPjVDa/ZSBHnhvMCtjSE55GDjVDa/ZSrZjovBYz:8q93U675F9a/ZSFue+zxa/ZSrJovBYz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 392 74a9b936f7301f31a8ef4d8606522360N.exe -
Executes dropped EXE 1 IoCs
pid Process 392 74a9b936f7301f31a8ef4d8606522360N.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3616 3500 WerFault.exe 83 2952 392 WerFault.exe 91 2832 392 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74a9b936f7301f31a8ef4d8606522360N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3500 74a9b936f7301f31a8ef4d8606522360N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 392 74a9b936f7301f31a8ef4d8606522360N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3500 wrote to memory of 392 3500 74a9b936f7301f31a8ef4d8606522360N.exe 91 PID 3500 wrote to memory of 392 3500 74a9b936f7301f31a8ef4d8606522360N.exe 91 PID 3500 wrote to memory of 392 3500 74a9b936f7301f31a8ef4d8606522360N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\74a9b936f7301f31a8ef4d8606522360N.exe"C:\Users\Admin\AppData\Local\Temp\74a9b936f7301f31a8ef4d8606522360N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 3442⤵
- Program crash
PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\74a9b936f7301f31a8ef4d8606522360N.exeC:\Users\Admin\AppData\Local\Temp\74a9b936f7301f31a8ef4d8606522360N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 392 -s 3443⤵
- Program crash
PID:2952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 392 -s 3843⤵
- Program crash
PID:2832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3500 -ip 35001⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 392 -ip 3921⤵PID:4868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 392 -ip 3921⤵PID:4476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD543d8e0500ace34636132687b0917ad1d
SHA1f718651e3c4f77d018d27cc19773fcbca48f90da
SHA256eb6fa1966a66c213f2d57a8c9052131b516b61584e3cbdf11803789e6c49948d
SHA5124f137e2a2477fa9a6f5ec2e4f56ae6604df3ce44022e2fa18d68cee9fa9b645919b8df9d22ca091cdbcf76bc01be01a74ec4f4a3a723f5d708e1d4eb4fef33ea