Analysis
-
max time kernel
80s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
83528a03d2fe162e0c589bc681f18370N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
83528a03d2fe162e0c589bc681f18370N.exe
Resource
win10v2004-20240802-en
General
-
Target
83528a03d2fe162e0c589bc681f18370N.exe
-
Size
960KB
-
MD5
83528a03d2fe162e0c589bc681f18370
-
SHA1
0ee02dc3d3e15dea32fe6a0ae139c414a85d4b34
-
SHA256
4dd0d9ab282ff7a7d89a32c4e751b843a06036968edf465fb260da4bf4f1b5e9
-
SHA512
e04438b71688ab7270edeb3bef2cb884bcc51fb3d3e0659bebc43c8961cf1c2867587454072d43cd746fb84967fc24af73b7e7494d30e3060283c0d05b2e7ce2
-
SSDEEP
12288:JNnqni3l7MNT7mh3CftnoV1jlDa/ZSt4mv+ni5:JNqni3hMJ0SftnAa/ZSt4mv+ni5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1068 83528a03d2fe162e0c589bc681f18370N.exe -
Executes dropped EXE 1 IoCs
pid Process 1068 83528a03d2fe162e0c589bc681f18370N.exe -
Loads dropped DLL 4 IoCs
pid Process 2384 83528a03d2fe162e0c589bc681f18370N.exe 1672 WerFault.exe 1672 WerFault.exe 1672 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1672 1068 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83528a03d2fe162e0c589bc681f18370N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83528a03d2fe162e0c589bc681f18370N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2384 83528a03d2fe162e0c589bc681f18370N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1068 83528a03d2fe162e0c589bc681f18370N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2384 wrote to memory of 1068 2384 83528a03d2fe162e0c589bc681f18370N.exe 31 PID 2384 wrote to memory of 1068 2384 83528a03d2fe162e0c589bc681f18370N.exe 31 PID 2384 wrote to memory of 1068 2384 83528a03d2fe162e0c589bc681f18370N.exe 31 PID 2384 wrote to memory of 1068 2384 83528a03d2fe162e0c589bc681f18370N.exe 31 PID 1068 wrote to memory of 1672 1068 83528a03d2fe162e0c589bc681f18370N.exe 32 PID 1068 wrote to memory of 1672 1068 83528a03d2fe162e0c589bc681f18370N.exe 32 PID 1068 wrote to memory of 1672 1068 83528a03d2fe162e0c589bc681f18370N.exe 32 PID 1068 wrote to memory of 1672 1068 83528a03d2fe162e0c589bc681f18370N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\83528a03d2fe162e0c589bc681f18370N.exe"C:\Users\Admin\AppData\Local\Temp\83528a03d2fe162e0c589bc681f18370N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\83528a03d2fe162e0c589bc681f18370N.exeC:\Users\Admin\AppData\Local\Temp\83528a03d2fe162e0c589bc681f18370N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:1672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960KB
MD56f0e8b952141ed596438528f2db58825
SHA1b64ebd2566bf5360ba146de640426c10ba3c5859
SHA25601af61f792e1dac9bb2efd6e87632d238af4624f37081485c28e9a1167bdfc18
SHA512f5f19503083bd50ae5e7b4bff3f82164276687626f64c5264a738737650a949b1586abbe7f812672de3923c57f450af31eaa83d31284dd49a50305ccdc5e64cc