Analysis
-
max time kernel
80s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
60151046014afe3d2089f9ddf8dd12a0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
60151046014afe3d2089f9ddf8dd12a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
60151046014afe3d2089f9ddf8dd12a0N.exe
-
Size
912KB
-
MD5
60151046014afe3d2089f9ddf8dd12a0
-
SHA1
5521499645c6a8dced9ed73829443e85534e8647
-
SHA256
37b85c885ff474b92ff5ffc32a1c52102b3d993e9b5e269b37f49df03e891183
-
SHA512
602b950108499ea749b86151b17d107a54eb2f72303b24d5b8bfcb8c4b31416f2c241bae7002938d5fddeaeb6c32cac0938224572fecc91278aa7dddbaf8daf0
-
SSDEEP
12288:JVQCRpklUgPj8l5oMDs3AW+ot8p1jWjp4cwJSVTswdtP55eOzL65rPHU3u6HrcHI:zZulSDswVoMOa/ZSUnK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 860 60151046014afe3d2089f9ddf8dd12a0N.exe -
Executes dropped EXE 1 IoCs
pid Process 860 60151046014afe3d2089f9ddf8dd12a0N.exe -
Loads dropped DLL 4 IoCs
pid Process 2468 60151046014afe3d2089f9ddf8dd12a0N.exe 2304 WerFault.exe 2304 WerFault.exe 2304 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2304 860 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60151046014afe3d2089f9ddf8dd12a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60151046014afe3d2089f9ddf8dd12a0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2468 60151046014afe3d2089f9ddf8dd12a0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 860 60151046014afe3d2089f9ddf8dd12a0N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2468 wrote to memory of 860 2468 60151046014afe3d2089f9ddf8dd12a0N.exe 32 PID 2468 wrote to memory of 860 2468 60151046014afe3d2089f9ddf8dd12a0N.exe 32 PID 2468 wrote to memory of 860 2468 60151046014afe3d2089f9ddf8dd12a0N.exe 32 PID 2468 wrote to memory of 860 2468 60151046014afe3d2089f9ddf8dd12a0N.exe 32 PID 860 wrote to memory of 2304 860 60151046014afe3d2089f9ddf8dd12a0N.exe 33 PID 860 wrote to memory of 2304 860 60151046014afe3d2089f9ddf8dd12a0N.exe 33 PID 860 wrote to memory of 2304 860 60151046014afe3d2089f9ddf8dd12a0N.exe 33 PID 860 wrote to memory of 2304 860 60151046014afe3d2089f9ddf8dd12a0N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\60151046014afe3d2089f9ddf8dd12a0N.exe"C:\Users\Admin\AppData\Local\Temp\60151046014afe3d2089f9ddf8dd12a0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\60151046014afe3d2089f9ddf8dd12a0N.exeC:\Users\Admin\AppData\Local\Temp\60151046014afe3d2089f9ddf8dd12a0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:2304
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
912KB
MD5721fb0b3702d61c3ea5287e6e3023d45
SHA1fe672c5bbd20772738fc57f0ba90a63f0e9ed53f
SHA256800708ac518cfa8a5ab191caff9c275a99a9c685fd55dffe2dbd3b61ee97ecab
SHA5123bcc02063c704bb7edfd682c60c14eadb9c56665280f3c2f8013cbf20d557836c8c7c2ad546f9633a7d4d06804827aa4e064372ae5a9918ad3417061cbbbfb16