Analysis
-
max time kernel
102s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
a1ceaf37cd137acee47745834794bf60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a1ceaf37cd137acee47745834794bf60N.exe
Resource
win10v2004-20240802-en
General
-
Target
a1ceaf37cd137acee47745834794bf60N.exe
-
Size
256KB
-
MD5
a1ceaf37cd137acee47745834794bf60
-
SHA1
42a99eced4ee9f1fb65d731521e133a02b3a4ed7
-
SHA256
6dd4f1af6ccd3a0fc22fdaaada5c09d6640df7f31294ed7e237678522154f8da
-
SHA512
b6b915d853d1a2f977e8cefe9227751ee82844f482b941839b83d929129c136baba93a9326858d9a10ab532ff5d982a9877644373adfd153a079e6ec9d981a04
-
SSDEEP
6144:umt3E6rkjiwkdCLZ0jSDea7f1ipUkwvjxph6EgMgVarbc67dAN5:tU6CRUzwvj0EPgVarbcoU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1092 a1ceaf37cd137acee47745834794bf60N.exe -
Executes dropped EXE 1 IoCs
pid Process 1092 a1ceaf37cd137acee47745834794bf60N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4984 3264 WerFault.exe 85 3068 1092 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1ceaf37cd137acee47745834794bf60N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3264 a1ceaf37cd137acee47745834794bf60N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1092 a1ceaf37cd137acee47745834794bf60N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3264 wrote to memory of 1092 3264 a1ceaf37cd137acee47745834794bf60N.exe 93 PID 3264 wrote to memory of 1092 3264 a1ceaf37cd137acee47745834794bf60N.exe 93 PID 3264 wrote to memory of 1092 3264 a1ceaf37cd137acee47745834794bf60N.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1ceaf37cd137acee47745834794bf60N.exe"C:\Users\Admin\AppData\Local\Temp\a1ceaf37cd137acee47745834794bf60N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3264 -s 3962⤵
- Program crash
PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\a1ceaf37cd137acee47745834794bf60N.exeC:\Users\Admin\AppData\Local\Temp\a1ceaf37cd137acee47745834794bf60N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 3643⤵
- Program crash
PID:3068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3264 -ip 32641⤵PID:2616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1092 -ip 10921⤵PID:3176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD50d6fca39f118f2a2c9a57875d71f7376
SHA1593bcc874300e346a0737723b6c99306669676ca
SHA256052f23cc77b85b53599009096278c2f1efe28846c6e989ecd12be7413d79810d
SHA512c6ad788052c720e1b7be9ad03357e005df5ab358cf3225676a6e9df025d478e1b3738719ec3192eba975ca90ff0b6b3cd2810c9e8cc512a930296f2c65f920d6