Analysis

  • max time kernel
    102s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 22:32

General

  • Target

    e92d46c43804f37329a3a36e0e86c690N.exe

  • Size

    416KB

  • MD5

    e92d46c43804f37329a3a36e0e86c690

  • SHA1

    32adf85b3e491e307b061cd67e1d457c248200e1

  • SHA256

    27757fa87f794f14998d37d9446d17b4a4326501353bd2aa98529669d086e3cc

  • SHA512

    6211f735421c5799b84667f1250dd024726509a88f2c022a3f16423c6db1ed92f35898f6de9d101e8ae2d463248d972d6b1f64ac0d32e9ad142da2a914fb6ea5

  • SSDEEP

    12288:rkCoyw6/EBBZju5ZiPdsuX9aLisvNeOVQ5zCD4TyWNz:Boy1/gT20dsuX9aLisvNeOVQ5zY4xNz

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e92d46c43804f37329a3a36e0e86c690N.exe
    "C:\Users\Admin\AppData\Local\Temp\e92d46c43804f37329a3a36e0e86c690N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 400
      2⤵
      • Program crash
      PID:3616
    • C:\Users\Admin\AppData\Local\Temp\e92d46c43804f37329a3a36e0e86c690N.exe
      C:\Users\Admin\AppData\Local\Temp\e92d46c43804f37329a3a36e0e86c690N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2584
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 364
        3⤵
        • Program crash
        PID:2116
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5044 -ip 5044
    1⤵
      PID:3812
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2584 -ip 2584
      1⤵
        PID:628

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\e92d46c43804f37329a3a36e0e86c690N.exe

              Filesize

              416KB

              MD5

              8250565601cd36b87bab20a13c653f69

              SHA1

              f0a9b8b85c13e647c85e52df0e8e26d1174edbe8

              SHA256

              606e519af6bd4c30af58246fd79fd9f6030ce831d866801b26036300ed3f2e60

              SHA512

              ac8887c85ea0fc3e8bd27e60efe67008936d29cc8083d406632013968a7509089e397a627326590f5391e2610697ef5085d39f4c3ee228d50ca94eb51ea407d5

            • memory/2584-7-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/2584-8-0x0000000000400000-0x000000000041A000-memory.dmp

              Filesize

              104KB

            • memory/2584-13-0x00000000014C0000-0x0000000001502000-memory.dmp

              Filesize

              264KB

            • memory/2584-14-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/5044-0-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/5044-6-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB