Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-09-2024 06:10
Static task
static1
Behavioral task
behavioral1
Sample
4fced8f23e19e90f89d110b6dc75f76edac9624fc3aa99f793a249a4e76a8ed4.exe
Resource
win7-20240708-en
General
-
Target
4fced8f23e19e90f89d110b6dc75f76edac9624fc3aa99f793a249a4e76a8ed4.exe
-
Size
411KB
-
MD5
ab82eeb4d0bfc29e266388cc4c2d372b
-
SHA1
836976baba2cba88f4a4c1238b22a466dbebea4a
-
SHA256
4fced8f23e19e90f89d110b6dc75f76edac9624fc3aa99f793a249a4e76a8ed4
-
SHA512
987b8634a5ac0fc6234ee10b5b437bff3450e6f473afcfa2c17c41df6d2241765e8813076a699aaa22bd58a00493b4d7b9008b5a96b1c12fe82120c1983605d1
-
SSDEEP
12288:JetLagza/unbxptENWXkVTTM5ct0bDMT:JettMMbxpSNMk12c20T
Malware Config
Signatures
-
Expiro payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2684-0-0x00000000013BB000-0x000000000144E000-memory.dmp family_expiro1 behavioral1/memory/2684-1-0x0000000001350000-0x000000000144E000-memory.dmp family_expiro1 behavioral1/memory/2684-2-0x00000000013BB000-0x000000000144E000-memory.dmp family_expiro1 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2756 2684 WerFault.exe 4fced8f23e19e90f89d110b6dc75f76edac9624fc3aa99f793a249a4e76a8ed4.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4fced8f23e19e90f89d110b6dc75f76edac9624fc3aa99f793a249a4e76a8ed4.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4fced8f23e19e90f89d110b6dc75f76edac9624fc3aa99f793a249a4e76a8ed4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
4fced8f23e19e90f89d110b6dc75f76edac9624fc3aa99f793a249a4e76a8ed4.exedescription pid process target process PID 2684 wrote to memory of 2756 2684 4fced8f23e19e90f89d110b6dc75f76edac9624fc3aa99f793a249a4e76a8ed4.exe WerFault.exe PID 2684 wrote to memory of 2756 2684 4fced8f23e19e90f89d110b6dc75f76edac9624fc3aa99f793a249a4e76a8ed4.exe WerFault.exe PID 2684 wrote to memory of 2756 2684 4fced8f23e19e90f89d110b6dc75f76edac9624fc3aa99f793a249a4e76a8ed4.exe WerFault.exe PID 2684 wrote to memory of 2756 2684 4fced8f23e19e90f89d110b6dc75f76edac9624fc3aa99f793a249a4e76a8ed4.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fced8f23e19e90f89d110b6dc75f76edac9624fc3aa99f793a249a4e76a8ed4.exe"C:\Users\Admin\AppData\Local\Temp\4fced8f23e19e90f89d110b6dc75f76edac9624fc3aa99f793a249a4e76a8ed4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 962⤵
- Program crash
PID:2756