Analysis

  • max time kernel
    93s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/09/2024, 10:03

General

  • Target

    3c0e62668297340d7c921f31ff8b93aef4045fd8451e2ed1af51487b4b840a0b.exe

  • Size

    163KB

  • MD5

    e830d4795e7a03e10bb55a96cfc8085a

  • SHA1

    ba5701ada9705c7fe980239539f872266f6b362b

  • SHA256

    3c0e62668297340d7c921f31ff8b93aef4045fd8451e2ed1af51487b4b840a0b

  • SHA512

    18d77795d1c99d67cdf521486c8f6bf64c409df019e8017c9775b40b8517ba2b8c349761aba3f05827e63e9d6584dd68fecc1b96c6ef3353140bfecb554c731f

  • SSDEEP

    3072:KEqeyzjXGszbcjSE2kCwsPQZDgsNqEuRqPTofAZToEE6ooqiq8EpKP1dwLFurHNo:KE5y3GfSEFCNPQZsFRqPdd1E6dqi4pyC

Score
7/10

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c0e62668297340d7c921f31ff8b93aef4045fd8451e2ed1af51487b4b840a0b.exe
    "C:\Users\Admin\AppData\Local\Temp\3c0e62668297340d7c921f31ff8b93aef4045fd8451e2ed1af51487b4b840a0b.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2916
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 1000
      2⤵
      • Program crash
      PID:3572
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2916 -ip 2916
    1⤵
      PID:2136

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\7-Zip\7z.dll

            Filesize

            1.9MB

            MD5

            c84ee071e0abb44cd0b7ac7e58b03dcc

            SHA1

            bfbf2720a0bcbca94c5b83950c345db95b57c8a3

            SHA256

            10e1ebcae2d6797cf3c0f324e8104c9cfb721fe10735a092f5df7220109d5c8e

            SHA512

            6f4a5e1ae119f40f6ebc46a222ef6bd452854b03109df91ff4962add9ff3dce65ce8f56eec14280da9a9c41ca92d69d33b6f6161f3842efae4e8f3543c34badf

          • C:\Program Files\Java\jre-1.8\bin\jp2ssv.dll

            Filesize

            5B

            MD5

            b5b682b742431a52ea8b17c72ad9c572

            SHA1

            326320f469235708c59f678c9a7357dca552d306

            SHA256

            30d9045a9f172208b13161d1f5204e5787e5e07bfbb4f490d0041b03b7f44f76

            SHA512

            4e1bd7cc616b3115baf6be7ebd29fe2d1123bc0f25464865a0cf9207b0344fba70747a5ce6f00e8d9c696881f6db1e12f81736bc748b6f2b60bf84c681a49163

          • memory/2916-0-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/2916-2314-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/2916-2317-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/2916-2464-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB