Overview
overview
10Static
static
3333e76fb70...0N.exe
windows7-x64
10333e76fb70...0N.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
100s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 13:02
Static task
static1
Behavioral task
behavioral1
Sample
333e76fb70bd934d7360c555ac40a370N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
333e76fb70bd934d7360c555ac40a370N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
333e76fb70bd934d7360c555ac40a370N.exe
-
Size
188KB
-
MD5
333e76fb70bd934d7360c555ac40a370
-
SHA1
3dbd4e9ecf56efc70515746b51af447191e32239
-
SHA256
f59268ac976b85521c5e2279d14f57a8d6b3926d710b1853963db0cbd6c4d3c2
-
SHA512
7e8b9f101b9fa326ea68519da2991d1717a968d7ed46418efe331d1c4067d10edaec7746a2158c749276e1c8fbfe926500342037e74fbab4e3a4a711af0a77a5
-
SSDEEP
3072:o030XCIscLlj+cM45KzxKwrKdvZz+7DzVX4++RC7AUBTBqzqdTFzILwrK:oje/NGv1+T2PDUCmdTFzIc
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2580 333e76fb70bd934d7360c555ac40a370N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4560 2580 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 333e76fb70bd934d7360c555ac40a370N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2580 wrote to memory of 3116 2580 333e76fb70bd934d7360c555ac40a370N.exe 92 PID 2580 wrote to memory of 3116 2580 333e76fb70bd934d7360c555ac40a370N.exe 92 PID 2580 wrote to memory of 3116 2580 333e76fb70bd934d7360c555ac40a370N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\333e76fb70bd934d7360c555ac40a370N.exe"C:\Users\Admin\AppData\Local\Temp\333e76fb70bd934d7360c555ac40a370N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\333e76fb70bd934d7360c555ac40a370N.exe"C:\Users\Admin\AppData\Local\Temp\333e76fb70bd934d7360c555ac40a370N.exe"2⤵PID:3116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 9202⤵
- Program crash
PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2580 -ip 25801⤵PID:708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD555a26d7800446f1373056064c64c3ce8
SHA180256857e9a0a9c8897923b717f3435295a76002
SHA256904fd5481d72f4e03b01a455f848dedd095d0fb17e33608e0d849f5196fb6ff8
SHA51204b8ab7a85c26f188c0a06f524488d6f2ac2884bf107c860c82e94ae12c3859f825133d78338fd2b594dfc48f7dc9888ae76fee786c6252a5c77c88755128a5b