Analysis
-
max time kernel
80s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 08:26
Static task
static1
Behavioral task
behavioral1
Sample
347c24d315aaba3f906c2779266522b0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
347c24d315aaba3f906c2779266522b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
347c24d315aaba3f906c2779266522b0N.exe
-
Size
1.6MB
-
MD5
347c24d315aaba3f906c2779266522b0
-
SHA1
396fe3151220a398d32c7bcbd002afe19122b03c
-
SHA256
3afc3d0679ea64ead850c3d0b2f816d265eb3a8ab0cd29e7a3cbe17e9fabd300
-
SHA512
53783b6705fd3cace104b360e13f948922cff901c56be0b6545886505a67348ce59ee931916dedac554948b86dbc3024da38015d0803629d54736c23eab4e1d6
-
SSDEEP
12288:JqD7uzLeIvnNSr4YrL1blG8dUIQjlDa/ZSdniF+G4mjUmTrVB6dMB:JwufemN8N5GIURa/ZSdniF+ujZXIMB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2892 347c24d315aaba3f906c2779266522b0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2892 347c24d315aaba3f906c2779266522b0N.exe -
Loads dropped DLL 4 IoCs
pid Process 2548 347c24d315aaba3f906c2779266522b0N.exe 572 WerFault.exe 572 WerFault.exe 572 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 572 2892 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 347c24d315aaba3f906c2779266522b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 347c24d315aaba3f906c2779266522b0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2548 347c24d315aaba3f906c2779266522b0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2892 347c24d315aaba3f906c2779266522b0N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2892 2548 347c24d315aaba3f906c2779266522b0N.exe 30 PID 2548 wrote to memory of 2892 2548 347c24d315aaba3f906c2779266522b0N.exe 30 PID 2548 wrote to memory of 2892 2548 347c24d315aaba3f906c2779266522b0N.exe 30 PID 2548 wrote to memory of 2892 2548 347c24d315aaba3f906c2779266522b0N.exe 30 PID 2892 wrote to memory of 572 2892 347c24d315aaba3f906c2779266522b0N.exe 31 PID 2892 wrote to memory of 572 2892 347c24d315aaba3f906c2779266522b0N.exe 31 PID 2892 wrote to memory of 572 2892 347c24d315aaba3f906c2779266522b0N.exe 31 PID 2892 wrote to memory of 572 2892 347c24d315aaba3f906c2779266522b0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\347c24d315aaba3f906c2779266522b0N.exe"C:\Users\Admin\AppData\Local\Temp\347c24d315aaba3f906c2779266522b0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\347c24d315aaba3f906c2779266522b0N.exeC:\Users\Admin\AppData\Local\Temp\347c24d315aaba3f906c2779266522b0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD50c0a20da1338c669d54641418be2ae6e
SHA17c88e89c1c3305dff74e6f3c265d36c2670a176e
SHA256045e6fff85e3848cda50713ab650ccfd810228b1ea9c7a25e995f256a12dd7dc
SHA5126e8b4a84b03075b803657c890f54c4edaf2e337081a33f6fd1dcadf3573ce10c71d8c99dedcded4d7947acc72b354cab2d38b333f3090ba3e79309ecfa3c6c29