Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 06:30
Static task
static1
Behavioral task
behavioral1
Sample
47cd1b855b4d3c5230cfa7c66d3e3090N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
47cd1b855b4d3c5230cfa7c66d3e3090N.exe
Resource
win10v2004-20240802-en
General
-
Target
47cd1b855b4d3c5230cfa7c66d3e3090N.exe
-
Size
256KB
-
MD5
47cd1b855b4d3c5230cfa7c66d3e3090
-
SHA1
d897279a1328d1821e68a1813569d87f1fd448fe
-
SHA256
947d7a17648e67106924a2ff81bed6248124ef5487bf0c559f11ac19d05459e4
-
SHA512
0ef940dcf28352003b87511a2e1686f4dbc5af5ea7bb17e35ca5812fab9313e141eded585a68c8b9d7030cbe290a0a08122b0afa8af9852ee12109c1481ad5a4
-
SSDEEP
6144:GakhAv5Icf4SFFRQSXFxPq379H0W7cyqCxSng7:hkoI1qScFi7j0nk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3332 47cd1b855b4d3c5230cfa7c66d3e3090N.exe -
Executes dropped EXE 1 IoCs
pid Process 3332 47cd1b855b4d3c5230cfa7c66d3e3090N.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 3840 1676 WerFault.exe 83 2784 3332 WerFault.exe 90 1472 3332 WerFault.exe 90 4504 3332 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47cd1b855b4d3c5230cfa7c66d3e3090N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47cd1b855b4d3c5230cfa7c66d3e3090N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1676 47cd1b855b4d3c5230cfa7c66d3e3090N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3332 47cd1b855b4d3c5230cfa7c66d3e3090N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1676 wrote to memory of 3332 1676 47cd1b855b4d3c5230cfa7c66d3e3090N.exe 90 PID 1676 wrote to memory of 3332 1676 47cd1b855b4d3c5230cfa7c66d3e3090N.exe 90 PID 1676 wrote to memory of 3332 1676 47cd1b855b4d3c5230cfa7c66d3e3090N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\47cd1b855b4d3c5230cfa7c66d3e3090N.exe"C:\Users\Admin\AppData\Local\Temp\47cd1b855b4d3c5230cfa7c66d3e3090N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1676 -s 3842⤵
- Program crash
PID:3840
-
-
C:\Users\Admin\AppData\Local\Temp\47cd1b855b4d3c5230cfa7c66d3e3090N.exeC:\Users\Admin\AppData\Local\Temp\47cd1b855b4d3c5230cfa7c66d3e3090N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 3523⤵
- Program crash
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 7483⤵
- Program crash
PID:1472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 8083⤵
- Program crash
PID:4504
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1676 -ip 16761⤵PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3332 -ip 33321⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3332 -ip 33321⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3332 -ip 33321⤵PID:3376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5a2424c3fdf7ad97c43566b2bdc8b2eea
SHA17891aaded05dd27f241c8730b37ca851f2437998
SHA25609ab4104d2f39d9d9c546add79999669792f77a9b0e0eba74fcbbde497baf442
SHA51258ef04f47457d05395f179cf7b0b2b7ca2db5ab19116381b893740eeea9691a55a4d4dad4ceaa4c3402d61b059287b9e83b6aedb918bf16f6bf7baed8d8ab1de