Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2024, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
845e2bde2f5a2b007f69c641fa64f790N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
845e2bde2f5a2b007f69c641fa64f790N.exe
Resource
win10v2004-20240802-en
General
-
Target
845e2bde2f5a2b007f69c641fa64f790N.exe
-
Size
589KB
-
MD5
845e2bde2f5a2b007f69c641fa64f790
-
SHA1
c4240332a166baafe603f1bfa4d2b1e1132e61fc
-
SHA256
b07ef93ad281106b564e9c1c8f2c213f3864a4eea4bf2d8f8d4c84a49631308f
-
SHA512
0be6155dd109369ad272bb45ce0f80188427e238abfe5e128e03aa4549e497a9d8cc5aad57c809f3029a27df025ca68f9738b96e5cfd2b130d4b6369669793e2
-
SSDEEP
6144:bCE6/mUXJ531nIUliViSZbLhaZfvMlLXICg2vj7OyzWxzRazUE1K52u8iqUNr63:F6TOUMBQf0ljW2vj7OyzoRaA+ei
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4540 1216 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 845e2bde2f5a2b007f69c641fa64f790N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1216 winver.exe 1216 winver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1216 winver.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3440 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4912 wrote to memory of 1216 4912 845e2bde2f5a2b007f69c641fa64f790N.exe 88 PID 4912 wrote to memory of 1216 4912 845e2bde2f5a2b007f69c641fa64f790N.exe 88 PID 4912 wrote to memory of 1216 4912 845e2bde2f5a2b007f69c641fa64f790N.exe 88 PID 4912 wrote to memory of 1216 4912 845e2bde2f5a2b007f69c641fa64f790N.exe 88 PID 1216 wrote to memory of 3440 1216 winver.exe 56 PID 1216 wrote to memory of 2932 1216 winver.exe 49
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2932
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\845e2bde2f5a2b007f69c641fa64f790N.exe"C:\Users\Admin\AppData\Local\Temp\845e2bde2f5a2b007f69c641fa64f790N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 6364⤵
- Program crash
PID:4540
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 1216 -ip 12161⤵PID:1672