Analysis
-
max time kernel
103s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
e23285d33b39c1fef06257f3f297a6d0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e23285d33b39c1fef06257f3f297a6d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
e23285d33b39c1fef06257f3f297a6d0N.exe
-
Size
448KB
-
MD5
e23285d33b39c1fef06257f3f297a6d0
-
SHA1
504e0cd998e69ab829c4feb0988bd3562418f39f
-
SHA256
e503f89a47d650dc820df1fe1694501639ddc0086f1def4eaa96e498bb577a4d
-
SHA512
638514f4028cf1611667cb4ebd6ddf1008f841401dcfb82e158458c7ae546f0f50431278e30bb996f094acf320e321225d6c8b3d435458b7388e215e425c525f
-
SSDEEP
12288:O9Zq+jBaev9w6TudXHwEqZQ0npM4dl0v5JdmY:1+Uu9wkIHwEqZQEM4dmv53
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4456 e23285d33b39c1fef06257f3f297a6d0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4456 e23285d33b39c1fef06257f3f297a6d0N.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 2008 5112 WerFault.exe 83 4472 4456 WerFault.exe 90 4828 4456 WerFault.exe 90 1416 4456 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e23285d33b39c1fef06257f3f297a6d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e23285d33b39c1fef06257f3f297a6d0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5112 e23285d33b39c1fef06257f3f297a6d0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4456 e23285d33b39c1fef06257f3f297a6d0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5112 wrote to memory of 4456 5112 e23285d33b39c1fef06257f3f297a6d0N.exe 90 PID 5112 wrote to memory of 4456 5112 e23285d33b39c1fef06257f3f297a6d0N.exe 90 PID 5112 wrote to memory of 4456 5112 e23285d33b39c1fef06257f3f297a6d0N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\e23285d33b39c1fef06257f3f297a6d0N.exe"C:\Users\Admin\AppData\Local\Temp\e23285d33b39c1fef06257f3f297a6d0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 3842⤵
- Program crash
PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\e23285d33b39c1fef06257f3f297a6d0N.exeC:\Users\Admin\AppData\Local\Temp\e23285d33b39c1fef06257f3f297a6d0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:4456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 3523⤵
- Program crash
PID:4472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 7683⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 7723⤵
- Program crash
PID:1416
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5112 -ip 51121⤵PID:2940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4456 -ip 44561⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4456 -ip 44561⤵PID:2732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4456 -ip 44561⤵PID:788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD56a433d639e2531a028f361ec0cc7335e
SHA1b7f8ee2ee4f1708e93956961d97e693e806117f4
SHA25630dbf456a75e2db79aa0a2f1cb6c5a21e3f422afa5e7c7557634d4da40720bde
SHA5129e4d83c4f1647621092346c27a3989fbfdaf2e0d91acf24a43399bd9a1234d3f7963902d3c5444af01a62eb4f958b36a582cf52190ad5b6e9f0a3c2de35c251a