Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
072be79903f039b04026872d2cb3c110N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
072be79903f039b04026872d2cb3c110N.exe
Resource
win10v2004-20240802-en
General
-
Target
072be79903f039b04026872d2cb3c110N.exe
-
Size
213KB
-
MD5
072be79903f039b04026872d2cb3c110
-
SHA1
5185573ba033c5fc3d3fe2e57c3ee8f0f77204f5
-
SHA256
cf6e61006ee135ac88d2c3b27bc3523c9d9eae0d695387df08a74345a4b05a6d
-
SHA512
fc377541c24458c502f0d8ad683059c5ad8aafd69ca84b0a9534ce1b243080b2d6147617062848c9fb06ed04d94343a44f8c103f10165d7a6e35f63322c81e11
-
SSDEEP
6144:agTg6xxFzkFkGMIsk504Gru8VRJyyslhlUgS7tDH0:/TBakf4GK+JOlhelJDH0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2920 072be79903f039b04026872d2cb3c110N.exe -
Executes dropped EXE 1 IoCs
pid Process 2920 072be79903f039b04026872d2cb3c110N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1912 1796 WerFault.exe 83 4444 2920 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 072be79903f039b04026872d2cb3c110N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1796 072be79903f039b04026872d2cb3c110N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2920 072be79903f039b04026872d2cb3c110N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2920 1796 072be79903f039b04026872d2cb3c110N.exe 91 PID 1796 wrote to memory of 2920 1796 072be79903f039b04026872d2cb3c110N.exe 91 PID 1796 wrote to memory of 2920 1796 072be79903f039b04026872d2cb3c110N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\072be79903f039b04026872d2cb3c110N.exe"C:\Users\Admin\AppData\Local\Temp\072be79903f039b04026872d2cb3c110N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 3962⤵
- Program crash
PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\072be79903f039b04026872d2cb3c110N.exeC:\Users\Admin\AppData\Local\Temp\072be79903f039b04026872d2cb3c110N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 3643⤵
- Program crash
PID:4444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1796 -ip 17961⤵PID:2952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2920 -ip 29201⤵PID:3712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD51d1a83dea758e005719758c28481d0b7
SHA1b978dae7e8d4177d9d14cbe5d45d640d770be1d9
SHA256175496f72045b05977889b084cfb8c821bfe5b85818fda253477bbf231f07beb
SHA5129db4062257cc6cf0575fe9f3e18ecab3850341e556755c4af605a286d33ee8dd7cd83c93ffece99f66be6fd71e6d3de12903a8d237c35acb1d43cf119d7beb36