Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2024 21:24
Static task
static1
Behavioral task
behavioral1
Sample
c4e34d3dca7eed7cebf30699c5b323a0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c4e34d3dca7eed7cebf30699c5b323a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
c4e34d3dca7eed7cebf30699c5b323a0N.exe
-
Size
197KB
-
MD5
c4e34d3dca7eed7cebf30699c5b323a0
-
SHA1
edd526e1e0cff6a4cd21fe9f7665b1af7129ac61
-
SHA256
6cfecdfeaa0a713ce40bd8d841288d5b4058cd927f31b498629564fdc7a8bd05
-
SHA512
4b242fa1e34523b1f5880d6c2e5640ff156b4b7e322512950bd60d70c5ca498011bd4f56d24fa8dd896f8e036a0c407bc8d9260bf175d3ffe7073eb68eb9b3fc
-
SSDEEP
3072:PFoTtBnouRPq3rF7iipwrhVRII9lgNOjcftaW6ZuaPrTipn7VqH2EYyk9gw9:KlRChMhQyH0EvW7sHA52
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3448 c4e34d3dca7eed7cebf30699c5b323a0N.exe -
Executes dropped EXE 1 IoCs
pid Process 3448 c4e34d3dca7eed7cebf30699c5b323a0N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4556 3592 WerFault.exe 84 440 3448 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4e34d3dca7eed7cebf30699c5b323a0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3592 c4e34d3dca7eed7cebf30699c5b323a0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3448 c4e34d3dca7eed7cebf30699c5b323a0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3592 wrote to memory of 3448 3592 c4e34d3dca7eed7cebf30699c5b323a0N.exe 92 PID 3592 wrote to memory of 3448 3592 c4e34d3dca7eed7cebf30699c5b323a0N.exe 92 PID 3592 wrote to memory of 3448 3592 c4e34d3dca7eed7cebf30699c5b323a0N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4e34d3dca7eed7cebf30699c5b323a0N.exe"C:\Users\Admin\AppData\Local\Temp\c4e34d3dca7eed7cebf30699c5b323a0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 4082⤵
- Program crash
PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\c4e34d3dca7eed7cebf30699c5b323a0N.exeC:\Users\Admin\AppData\Local\Temp\c4e34d3dca7eed7cebf30699c5b323a0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 3763⤵
- Program crash
PID:440
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3592 -ip 35921⤵PID:2912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3448 -ip 34481⤵PID:4308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD5b60146d9a8f29d1a6f2f5a6b8191d07f
SHA1bd66cc1291d7208038d4356c18d3700f9adcd6cb
SHA256848ff1af38589684c79166eed5cde83b7a05c86d0186870c97b8c549041a7a25
SHA51218ab4fd409c8e3a29719af1b61b93bd84b944523fcdafe0a3d539083aa65d52d26a93c74be273623a2f722f6d101a5103002bee1c3e1aacfa15a64533f16877e