Analysis
-
max time kernel
81s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
80f9e477b4f96559a94e41a38234e9a0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
80f9e477b4f96559a94e41a38234e9a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
80f9e477b4f96559a94e41a38234e9a0N.exe
-
Size
8.2MB
-
MD5
80f9e477b4f96559a94e41a38234e9a0
-
SHA1
6028438a19298b2aa9b475c6c5bac58fbe555e8a
-
SHA256
6466898737d5ad36f206f7fca3fe089de2ccbbe2407c7e65f9a42a43fcf2a071
-
SHA512
a3fef3b8afab8d2041c30327000b6018cc40c83e4b368616b6440014f6c717fd1158c9058fe04a3c4dd74feeeeff0ac8faa5c7cc03f7d0ab604b90857af48e69
-
SSDEEP
98304:PDGfXtWHdC/yvl5YBLjU8/cOT0MMHMMM6MMZMMMqo30MMHMMM6MMZMMMqaYMMHMO:PDOuCQl5CXfQ1/z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2316 80f9e477b4f96559a94e41a38234e9a0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 80f9e477b4f96559a94e41a38234e9a0N.exe -
Loads dropped DLL 4 IoCs
pid Process 2932 80f9e477b4f96559a94e41a38234e9a0N.exe 2548 WerFault.exe 2548 WerFault.exe 2548 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2548 2316 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80f9e477b4f96559a94e41a38234e9a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80f9e477b4f96559a94e41a38234e9a0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2932 80f9e477b4f96559a94e41a38234e9a0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2316 80f9e477b4f96559a94e41a38234e9a0N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2316 2932 80f9e477b4f96559a94e41a38234e9a0N.exe 32 PID 2932 wrote to memory of 2316 2932 80f9e477b4f96559a94e41a38234e9a0N.exe 32 PID 2932 wrote to memory of 2316 2932 80f9e477b4f96559a94e41a38234e9a0N.exe 32 PID 2932 wrote to memory of 2316 2932 80f9e477b4f96559a94e41a38234e9a0N.exe 32 PID 2316 wrote to memory of 2548 2316 80f9e477b4f96559a94e41a38234e9a0N.exe 33 PID 2316 wrote to memory of 2548 2316 80f9e477b4f96559a94e41a38234e9a0N.exe 33 PID 2316 wrote to memory of 2548 2316 80f9e477b4f96559a94e41a38234e9a0N.exe 33 PID 2316 wrote to memory of 2548 2316 80f9e477b4f96559a94e41a38234e9a0N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\80f9e477b4f96559a94e41a38234e9a0N.exe"C:\Users\Admin\AppData\Local\Temp\80f9e477b4f96559a94e41a38234e9a0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\80f9e477b4f96559a94e41a38234e9a0N.exeC:\Users\Admin\AppData\Local\Temp\80f9e477b4f96559a94e41a38234e9a0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:2548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD58f56703f66dc08cb76ed1f48a29b1c63
SHA1e7d855116732af72320c0505f5e2967826d95f25
SHA2563d2942c5b0597cfc041b0f8bc61c3d79b2f500e65a9f029a6e99c2ada199c38d
SHA51285ca7c2e9ec923f17a0631594281c4fb8d671750644f6ba7384e98e93180309e26495fedeec6134f9d2249965bf8f1bfc421642440a01d4607bc4159cacdd6f4