Analysis
-
max time kernel
101s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
b9352fd9182b2afebca1b39f093f3dd0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b9352fd9182b2afebca1b39f093f3dd0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b9352fd9182b2afebca1b39f093f3dd0N.exe
-
Size
1.1MB
-
MD5
b9352fd9182b2afebca1b39f093f3dd0
-
SHA1
909877d9ba550f99f971bdf6922ec135e9a6c2ea
-
SHA256
82ba03aebcf2eb0328d0bf093945f82e29f54ceadbd55d09a9f97c8d180953d7
-
SHA512
49493f93f7913a5ec6914c429d17f1f3d8e1a6e50af22078778a19388ea91994dda1a35323aa38b0b07036b7c914103b5f4c0ecc2572df57d6bb6c59ceba2995
-
SSDEEP
6144:K5ISclkr4/xCN522wxIygC36+HGQsJNgPqwSqfkrEGGIAz2xwABrxxJa/YESjeB/:K0nx12we1j+ztdz2xjlDa/ZSEniF+G4V
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3020 b9352fd9182b2afebca1b39f093f3dd0N.exe -
Executes dropped EXE 1 IoCs
pid Process 3020 b9352fd9182b2afebca1b39f093f3dd0N.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 4420 4012 WerFault.exe 83 4088 3020 WerFault.exe 91 2112 3020 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9352fd9182b2afebca1b39f093f3dd0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4012 b9352fd9182b2afebca1b39f093f3dd0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3020 b9352fd9182b2afebca1b39f093f3dd0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4012 wrote to memory of 3020 4012 b9352fd9182b2afebca1b39f093f3dd0N.exe 91 PID 4012 wrote to memory of 3020 4012 b9352fd9182b2afebca1b39f093f3dd0N.exe 91 PID 4012 wrote to memory of 3020 4012 b9352fd9182b2afebca1b39f093f3dd0N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9352fd9182b2afebca1b39f093f3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\b9352fd9182b2afebca1b39f093f3dd0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 3442⤵
- Program crash
PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\b9352fd9182b2afebca1b39f093f3dd0N.exeC:\Users\Admin\AppData\Local\Temp\b9352fd9182b2afebca1b39f093f3dd0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 3443⤵
- Program crash
PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 3643⤵
- Program crash
PID:2112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4012 -ip 40121⤵PID:3656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3020 -ip 30201⤵PID:1752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3020 -ip 30201⤵PID:5044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD587a3e459c2b7bb70046ad1d45c181004
SHA1126342017f75728ff68c49664e16d86b46927195
SHA25658015a9d394b855151d8c3c86e7b6e2d7fd1eea491cf0a86831303d65c20cdc3
SHA51213242b07a5bcb98fd8e4a1e8f70f92a031537a5e0082f35f09f20e8d714c40bfbe71376c4d0ed22112cf451d066ff245e007b704c65e5e6d8c642c8295092a3b