Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 03:44
Static task
static1
Behavioral task
behavioral1
Sample
2021FI30005.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2021FI30005.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
3qk9.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
3qk9.dll
Resource
win10v2004-20240802-en
General
-
Target
2021FI30005.exe
-
Size
226KB
-
MD5
aaeb4ca48de2f02e82a7073f5b7845d3
-
SHA1
fe42b6a380d09d09ca116730b167bad2ab642d82
-
SHA256
77353f06427f5e7d0e4c28e4d5690700a2cf6789edc0f9c51682dd20bb65bf78
-
SHA512
5e703cb507a7436b404b212fd46ae7a2c9bc935aee5f993c04bd8bc594700350016801ca957015614769c80d3a2ab80a52b7e6a08e7f8c146a01696e55259b20
-
SSDEEP
6144:yx/MDhXmawdvJQpBQ60U0BpYgbgO+Kl9GPl8f:2DawdvRjuKOPif
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
2021FI30005.exepid Process 3820 2021FI30005.exe 3820 2021FI30005.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1620 3820 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2021FI30005.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2021FI30005.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
2021FI30005.exepid Process 3820 2021FI30005.exe 3820 2021FI30005.exe 3820 2021FI30005.exe 3820 2021FI30005.exe 3820 2021FI30005.exe 3820 2021FI30005.exe 3820 2021FI30005.exe 3820 2021FI30005.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2021FI30005.exedescription pid Process procid_target PID 3820 wrote to memory of 3236 3820 2021FI30005.exe 84 PID 3820 wrote to memory of 3236 3820 2021FI30005.exe 84 PID 3820 wrote to memory of 3236 3820 2021FI30005.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2021FI30005.exe"C:\Users\Admin\AppData\Local\Temp\2021FI30005.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\2021FI30005.exe"C:\Users\Admin\AppData\Local\Temp\2021FI30005.exe"2⤵PID:3236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 10082⤵
- Program crash
PID:1620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3820 -ip 38201⤵PID:4036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD58f9290de28c93e280c387b72adf45543
SHA1305b45d1ca5d6de308cdc76796548a04ec677a98
SHA25675597e1e381141f1606bf96c2b7a6c5b7eb1fa3ea65e37152bdb305155776192
SHA5127c4694b53e8ad79fc78d5044528026ca3d000434a8b0121b89bfc1335c97b0a242774ed4d96b7a777fd65f034ef1a18d656dbe27967d616157912afe372a49db
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c