Analysis
-
max time kernel
93s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2024 14:34
Behavioral task
behavioral1
Sample
85c991829b6448c791a0f7aa1e19e4c0N.exe
Resource
win7-20240708-en
General
-
Target
85c991829b6448c791a0f7aa1e19e4c0N.exe
-
Size
7.7MB
-
MD5
85c991829b6448c791a0f7aa1e19e4c0
-
SHA1
5dea749f5995af8d3f78c898c7b861072ae54edb
-
SHA256
6950f7ef08000ebdce33f5d1c88c53d5c2761469f00b3d68730b22d22e8d180a
-
SHA512
50be67a49a68c872dc70b319741eed8c2f7f1ae977474c4517e17dd0727466bfa709ece5a966b96363975aec48fdf18062963110a3d48ab82210d9abb8df12ce
-
SSDEEP
196608:Vsssssssssssssssssssssssssssssssssssssssssss6ggggggggggggggggggy:VssssssssssssssssssssssssssssssS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3428 svrwsc.exe -
resource yara_rule behavioral2/memory/4864-0-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4864-2-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/files/0x00090000000233c3-5.dat upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svrwsc.exe 85c991829b6448c791a0f7aa1e19e4c0N.exe File created C:\Windows\SysWOW64\svrwsc.exe svrwsc.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85c991829b6448c791a0f7aa1e19e4c0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\85c991829b6448c791a0f7aa1e19e4c0N.exe"C:\Users\Admin\AppData\Local\Temp\85c991829b6448c791a0f7aa1e19e4c0N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4864
-
C:\Windows\SysWOW64\svrwsc.exeC:\Windows\SysWOW64\svrwsc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.1MB
MD57afcfbf8ab178839bcf7764e9b869259
SHA193eaddf1ad3e1d04dd26dbc51cadfc4c23c24f1f
SHA256404432f79a8eb48f82ee24c07fd2125712c65ca851671664f304eb2d255f2042
SHA51278102540a4c00ba393e0a0947ce867296395ff3882a33ab41d7f90f38adae6612be11f683a872884ea48ec0710b93c48e069522e867e206abfe107b3e0db8834