Analysis
-
max time kernel
104s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
296eb4714d924d2fbc8cf2efd7065b00N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
296eb4714d924d2fbc8cf2efd7065b00N.exe
Resource
win10v2004-20240802-en
General
-
Target
296eb4714d924d2fbc8cf2efd7065b00N.exe
-
Size
391KB
-
MD5
296eb4714d924d2fbc8cf2efd7065b00
-
SHA1
f69689430f7ef9fd4d3a91ba619567d3ed413f14
-
SHA256
ca7ca3f559dd77cbdf1dc1f78e197370834f8a1dd61d9e184e057b8d7b832dde
-
SHA512
ea07e4c8a41b7b39c91646a51011e939c0c65e9ec8bde77f740458feb523363c98d9e01f1f58c43b3e20e36cac8aa6399974f17090ec0a933421000375c8e502
-
SSDEEP
12288:HFNVVPc1T9n6EvoKlSql4ejAAWxe1X7BMPpqeepz4eeriD:HFkZ6EvoKlSql4ejrWx4X7BMPpqeepzN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2732 296eb4714d924d2fbc8cf2efd7065b00N.exe -
Executes dropped EXE 1 IoCs
pid Process 2732 296eb4714d924d2fbc8cf2efd7065b00N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3732 4400 WerFault.exe 83 1928 2732 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 296eb4714d924d2fbc8cf2efd7065b00N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4400 296eb4714d924d2fbc8cf2efd7065b00N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2732 296eb4714d924d2fbc8cf2efd7065b00N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4400 wrote to memory of 2732 4400 296eb4714d924d2fbc8cf2efd7065b00N.exe 91 PID 4400 wrote to memory of 2732 4400 296eb4714d924d2fbc8cf2efd7065b00N.exe 91 PID 4400 wrote to memory of 2732 4400 296eb4714d924d2fbc8cf2efd7065b00N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\296eb4714d924d2fbc8cf2efd7065b00N.exe"C:\Users\Admin\AppData\Local\Temp\296eb4714d924d2fbc8cf2efd7065b00N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 3962⤵
- Program crash
PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\296eb4714d924d2fbc8cf2efd7065b00N.exeC:\Users\Admin\AppData\Local\Temp\296eb4714d924d2fbc8cf2efd7065b00N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 3643⤵
- Program crash
PID:1928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4400 -ip 44001⤵PID:820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2732 -ip 27321⤵PID:2004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD574460878368a3748784d2ddfba16e8a4
SHA1fb9ac95df918621e5195047f77891474269e5742
SHA256782f07573c0205f8f86118fd6d6b180bc464e92208cb7627d7d805ede8726246
SHA5120c2095919b241ca95c9bc7cbb3d361aab134fe9577ed43cb266ceacbcae4bee77963a0ed1360cb9917b7fa96fa66e39be7a60cb047dc3fc0293e6f36893d7467