Analysis
-
max time kernel
136s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 07:48
Behavioral task
behavioral1
Sample
17972622a8266a8a9d13c7c615c22447.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
17972622a8266a8a9d13c7c615c22447.exe
Resource
win10v2004-20240802-en
General
-
Target
17972622a8266a8a9d13c7c615c22447.exe
-
Size
4.2MB
-
MD5
17972622a8266a8a9d13c7c615c22447
-
SHA1
526f6740f9d8150a8a64ea140630284dc1055e23
-
SHA256
b20ef2f010ea30d51e3820cb66a03a95aa22479e64d91d37da4e56c7f5f678e2
-
SHA512
22338a00d159012c4fdcbe597d7ede82d5f038387cb2f8cd1003946dd06c25d6efb5338b3668c41ebdfdc88df1ca3104a67fa41354b800334a4e48288b5c16a4
-
SSDEEP
24576:3YWwdz/USmnfYxCJUX7hisChhVrZAqN7YrK4ZWq9qI+I3ofK9rVAkUcqtFTo:3YWwJskCWis88LanFT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2936 卉䝗U -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2208 set thread context of 2936 2208 17972622a8266a8a9d13c7c615c22447.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 2728 2936 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 卉䝗U -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2936 2208 17972622a8266a8a9d13c7c615c22447.exe 86 PID 2208 wrote to memory of 2936 2208 17972622a8266a8a9d13c7c615c22447.exe 86 PID 2208 wrote to memory of 2936 2208 17972622a8266a8a9d13c7c615c22447.exe 86 PID 2208 wrote to memory of 2936 2208 17972622a8266a8a9d13c7c615c22447.exe 86 PID 2208 wrote to memory of 2936 2208 17972622a8266a8a9d13c7c615c22447.exe 86 PID 2208 wrote to memory of 2936 2208 17972622a8266a8a9d13c7c615c22447.exe 86 PID 2208 wrote to memory of 2936 2208 17972622a8266a8a9d13c7c615c22447.exe 86 PID 2208 wrote to memory of 2936 2208 17972622a8266a8a9d13c7c615c22447.exe 86 PID 2208 wrote to memory of 2936 2208 17972622a8266a8a9d13c7c615c22447.exe 86 PID 2208 wrote to memory of 2936 2208 17972622a8266a8a9d13c7c615c22447.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\17972622a8266a8a9d13c7c615c22447.exe"C:\Users\Admin\AppData\Local\Temp\17972622a8266a8a9d13c7c615c22447.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\卉䝗U"C:\Users\Admin\AppData\Local\Temp\卉䝗U"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 3443⤵
- Program crash
PID:2728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2936 -ip 29361⤵PID:4156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD53992f464696b0eeff236aef93b1fdbd5
SHA18dddabaea6b342efc4f5b244420a0af055ae691e
SHA2560d1a8457014f2eb2563a91d1509dba38f6c418fedf5f241d8579d15a93e40e14
SHA51227a63b43dc50faf4d9b06e10daa15e83dfb3f3be1bd3af83ea6990bd8ae6d3a6a7fc2f928822db972aaf1305970f4587d768d68cd7e1124bc8f710c1d3ee19a6