Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 17:37
Static task
static1
Behavioral task
behavioral1
Sample
698364810e2fd6ba6857b68684f9d480N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
698364810e2fd6ba6857b68684f9d480N.exe
Resource
win10v2004-20240802-en
General
-
Target
698364810e2fd6ba6857b68684f9d480N.exe
-
Size
589KB
-
MD5
698364810e2fd6ba6857b68684f9d480
-
SHA1
79c495f05bfc97d3b07f73cd3f293914391c7d52
-
SHA256
73bbf197a08b4161ac2e965e086a6a0bb7a95782ea99c10d418f7ce229c2127e
-
SHA512
a17646d2dbd98026ced3743519a5b3981f212429dbdab8a30ae209cc7dc9b0c31a618e85b03101946a48b4e4ca9ff551a562921add582d3e3f60cf6331c7c194
-
SSDEEP
6144:IZEeGyALdVaU2vqUk21Os/az/MyX8cGQPTlyl48pArv8kEVS1aHn3B:I2T3LdVaU2qOa38RI5yl48pArv8o4HR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2240 698364810e2fd6ba6857b68684f9d480N.exe -
Executes dropped EXE 1 IoCs
pid Process 2240 698364810e2fd6ba6857b68684f9d480N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2008 2716 WerFault.exe 90 1864 2240 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 698364810e2fd6ba6857b68684f9d480N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2716 698364810e2fd6ba6857b68684f9d480N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2240 698364810e2fd6ba6857b68684f9d480N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2240 2716 698364810e2fd6ba6857b68684f9d480N.exe 98 PID 2716 wrote to memory of 2240 2716 698364810e2fd6ba6857b68684f9d480N.exe 98 PID 2716 wrote to memory of 2240 2716 698364810e2fd6ba6857b68684f9d480N.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\698364810e2fd6ba6857b68684f9d480N.exe"C:\Users\Admin\AppData\Local\Temp\698364810e2fd6ba6857b68684f9d480N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 3962⤵
- Program crash
PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\698364810e2fd6ba6857b68684f9d480N.exeC:\Users\Admin\AppData\Local\Temp\698364810e2fd6ba6857b68684f9d480N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 3643⤵
- Program crash
PID:1864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2716 -ip 27161⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2240 -ip 22401⤵PID:1004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4608,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4612 /prefetch:81⤵PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
589KB
MD55a3c9a5bfb3d33a9f40d4f386bad0fbb
SHA1b12390c36f04145d0f3e7b6404f1415c365a6df6
SHA256129ff7e319d2d358f497f1af941f9ab6bc5bc9261aa9ee461ab6566f8cf3b49a
SHA5125297b6b3732b4994cb26e0ca1145f4397cf796d9762ddce85c411a8170bfce66383c37709c5b7b187f43bc5cd771fd8e7b4964811d9547330e645879cbb70b6e