Analysis
-
max time kernel
102s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
e92d46c43804f37329a3a36e0e86c690N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e92d46c43804f37329a3a36e0e86c690N.exe
Resource
win10v2004-20240802-en
General
-
Target
e92d46c43804f37329a3a36e0e86c690N.exe
-
Size
416KB
-
MD5
e92d46c43804f37329a3a36e0e86c690
-
SHA1
32adf85b3e491e307b061cd67e1d457c248200e1
-
SHA256
27757fa87f794f14998d37d9446d17b4a4326501353bd2aa98529669d086e3cc
-
SHA512
6211f735421c5799b84667f1250dd024726509a88f2c022a3f16423c6db1ed92f35898f6de9d101e8ae2d463248d972d6b1f64ac0d32e9ad142da2a914fb6ea5
-
SSDEEP
12288:rkCoyw6/EBBZju5ZiPdsuX9aLisvNeOVQ5zCD4TyWNz:Boy1/gT20dsuX9aLisvNeOVQ5zY4xNz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2584 e92d46c43804f37329a3a36e0e86c690N.exe -
Executes dropped EXE 1 IoCs
pid Process 2584 e92d46c43804f37329a3a36e0e86c690N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3616 5044 WerFault.exe 83 2116 2584 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e92d46c43804f37329a3a36e0e86c690N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5044 e92d46c43804f37329a3a36e0e86c690N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2584 e92d46c43804f37329a3a36e0e86c690N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5044 wrote to memory of 2584 5044 e92d46c43804f37329a3a36e0e86c690N.exe 91 PID 5044 wrote to memory of 2584 5044 e92d46c43804f37329a3a36e0e86c690N.exe 91 PID 5044 wrote to memory of 2584 5044 e92d46c43804f37329a3a36e0e86c690N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e92d46c43804f37329a3a36e0e86c690N.exe"C:\Users\Admin\AppData\Local\Temp\e92d46c43804f37329a3a36e0e86c690N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 4002⤵
- Program crash
PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\e92d46c43804f37329a3a36e0e86c690N.exeC:\Users\Admin\AppData\Local\Temp\e92d46c43804f37329a3a36e0e86c690N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 3643⤵
- Program crash
PID:2116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5044 -ip 50441⤵PID:3812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2584 -ip 25841⤵PID:628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD58250565601cd36b87bab20a13c653f69
SHA1f0a9b8b85c13e647c85e52df0e8e26d1174edbe8
SHA256606e519af6bd4c30af58246fd79fd9f6030ce831d866801b26036300ed3f2e60
SHA512ac8887c85ea0fc3e8bd27e60efe67008936d29cc8083d406632013968a7509089e397a627326590f5391e2610697ef5085d39f4c3ee228d50ca94eb51ea407d5