Analysis

  • max time kernel
    102s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 17:58

General

  • Target

    a1ceaf37cd137acee47745834794bf60N.exe

  • Size

    256KB

  • MD5

    a1ceaf37cd137acee47745834794bf60

  • SHA1

    42a99eced4ee9f1fb65d731521e133a02b3a4ed7

  • SHA256

    6dd4f1af6ccd3a0fc22fdaaada5c09d6640df7f31294ed7e237678522154f8da

  • SHA512

    b6b915d853d1a2f977e8cefe9227751ee82844f482b941839b83d929129c136baba93a9326858d9a10ab532ff5d982a9877644373adfd153a079e6ec9d981a04

  • SSDEEP

    6144:umt3E6rkjiwkdCLZ0jSDea7f1ipUkwvjxph6EgMgVarbc67dAN5:tU6CRUzwvj0EPgVarbcoU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1ceaf37cd137acee47745834794bf60N.exe
    "C:\Users\Admin\AppData\Local\Temp\a1ceaf37cd137acee47745834794bf60N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3264
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3264 -s 396
      2⤵
      • Program crash
      PID:4984
    • C:\Users\Admin\AppData\Local\Temp\a1ceaf37cd137acee47745834794bf60N.exe
      C:\Users\Admin\AppData\Local\Temp\a1ceaf37cd137acee47745834794bf60N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1092
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 364
        3⤵
        • Program crash
        PID:3068
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3264 -ip 3264
    1⤵
      PID:2616
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1092 -ip 1092
      1⤵
        PID:3176

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\a1ceaf37cd137acee47745834794bf60N.exe

        Filesize

        256KB

        MD5

        0d6fca39f118f2a2c9a57875d71f7376

        SHA1

        593bcc874300e346a0737723b6c99306669676ca

        SHA256

        052f23cc77b85b53599009096278c2f1efe28846c6e989ecd12be7413d79810d

        SHA512

        c6ad788052c720e1b7be9ad03357e005df5ab358cf3225676a6e9df025d478e1b3738719ec3192eba975ca90ff0b6b3cd2810c9e8cc512a930296f2c65f920d6

      • memory/1092-7-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1092-13-0x00000000014C0000-0x00000000014FE000-memory.dmp

        Filesize

        248KB

      • memory/1092-8-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/1092-14-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3264-0-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3264-6-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB