Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
2b631c9c9e9214b5e8ccbf99e686e4b0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2b631c9c9e9214b5e8ccbf99e686e4b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
2b631c9c9e9214b5e8ccbf99e686e4b0N.exe
-
Size
268KB
-
MD5
2b631c9c9e9214b5e8ccbf99e686e4b0
-
SHA1
b2931f96754a69c4e70a1094bf6a544f23e5639e
-
SHA256
dd16ba88f793e4830bd4e0b7047a0fbd301f04df014dd97af6fccac0b94f096c
-
SHA512
227393064d226f12f183ff1923c5ebad6fe72794286c7a26143972a5e6ebe81924b53972ae693a5ee2b0c977e8ae4c38742fe863c7e9d37e49f2b6f6447b24c0
-
SSDEEP
6144:GOIHPueiHhqx0bRYi4DO/8pCYdYCQLlz:GtHiBqx0bRYiLaHdbQLN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1676 2b631c9c9e9214b5e8ccbf99e686e4b0N.exe -
Executes dropped EXE 1 IoCs
pid Process 1676 2b631c9c9e9214b5e8ccbf99e686e4b0N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5084 3140 WerFault.exe 83 1088 1676 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b631c9c9e9214b5e8ccbf99e686e4b0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3140 2b631c9c9e9214b5e8ccbf99e686e4b0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1676 2b631c9c9e9214b5e8ccbf99e686e4b0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3140 wrote to memory of 1676 3140 2b631c9c9e9214b5e8ccbf99e686e4b0N.exe 91 PID 3140 wrote to memory of 1676 3140 2b631c9c9e9214b5e8ccbf99e686e4b0N.exe 91 PID 3140 wrote to memory of 1676 3140 2b631c9c9e9214b5e8ccbf99e686e4b0N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b631c9c9e9214b5e8ccbf99e686e4b0N.exe"C:\Users\Admin\AppData\Local\Temp\2b631c9c9e9214b5e8ccbf99e686e4b0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 3962⤵
- Program crash
PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\2b631c9c9e9214b5e8ccbf99e686e4b0N.exeC:\Users\Admin\AppData\Local\Temp\2b631c9c9e9214b5e8ccbf99e686e4b0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1676 -s 3683⤵
- Program crash
PID:1088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3140 -ip 31401⤵PID:1484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1676 -ip 16761⤵PID:4088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5a5cd8dfdf193cee6b54ecc378c460830
SHA1042d7c2afbc2760db17a4c7909af16939453f868
SHA25686b45cae6c8fc8d47ff0866f87bbfb894a98c330c7b17518b372d1dbef07db8d
SHA512964c5de5a5a47df20abbde7290d4ce81673c3642266b21722da389b07e9429e3ea88c32fc78f43a04b589324be2e42365b7a5069b791f0308bdd549b4a3635b3