Analysis
-
max time kernel
104s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
b0d14872eb0540b9104323068aae3200N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b0d14872eb0540b9104323068aae3200N.exe
Resource
win10v2004-20240802-en
General
-
Target
b0d14872eb0540b9104323068aae3200N.exe
-
Size
362KB
-
MD5
b0d14872eb0540b9104323068aae3200
-
SHA1
977bbdfc1be594c52f83e63691d0cb01aae03db0
-
SHA256
46770e3b98107db4163779924daa0effd010f24c328e8bf2881e1133a530b162
-
SHA512
58d81ffc6a6de8b1a8a9d52effaf8e7dde5884fdbe288cd26166ef6ea270fd7a97305275fbadce459ea722980452841c9cdc5435147550619fd6bb8cf4738cc4
-
SSDEEP
6144:fXsk+pe496RY4UDtQVrldMd2k/JrAV40saiigCUlhu9a6r/V:0kx491QldMd2qJrAVQ5zCUlh+auV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 976 b0d14872eb0540b9104323068aae3200N.exe -
Executes dropped EXE 1 IoCs
pid Process 976 b0d14872eb0540b9104323068aae3200N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2756 3996 WerFault.exe 83 4440 976 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0d14872eb0540b9104323068aae3200N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3996 b0d14872eb0540b9104323068aae3200N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 976 b0d14872eb0540b9104323068aae3200N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3996 wrote to memory of 976 3996 b0d14872eb0540b9104323068aae3200N.exe 91 PID 3996 wrote to memory of 976 3996 b0d14872eb0540b9104323068aae3200N.exe 91 PID 3996 wrote to memory of 976 3996 b0d14872eb0540b9104323068aae3200N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0d14872eb0540b9104323068aae3200N.exe"C:\Users\Admin\AppData\Local\Temp\b0d14872eb0540b9104323068aae3200N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 4042⤵
- Program crash
PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\b0d14872eb0540b9104323068aae3200N.exeC:\Users\Admin\AppData\Local\Temp\b0d14872eb0540b9104323068aae3200N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 3763⤵
- Program crash
PID:4440
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3996 -ip 39961⤵PID:3276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 976 -ip 9761⤵PID:3520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
362KB
MD52e7ede70493497b8d00a8d55b930ed83
SHA17b41e93673ff4a5ae2354d0c6cc38a61d5bb5d46
SHA256eda60d8c2e2c1fb6da07830de7def3fe9023983638a373e13cc551873274e99d
SHA512ebe39f1dee8d769d3b21b22f616687d3e18f8a5aba61f2a86827b5a7991c79e5e741c8c20de234bde01d089ffa9f6fc1f0757ca6fd368fe284fbb35e6abe10df