Analysis

  • max time kernel
    92s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/09/2024, 11:45

General

  • Target

    20-EM-00- PI-INQ-3001.exe

  • Size

    1.1MB

  • MD5

    f295444b03c418b35dcb676ed284e846

  • SHA1

    314ca3515894c3d36b10653a7bace039a6991f19

  • SHA256

    594db372022016f6e585ebdba18d74c642ce91613bdb2925d11b0e499c9d46d9

  • SHA512

    ce256901d2c79be4ffd96ff2f0ec2d8bb5f76db2a0baa489639aac5a2d5646d9bfbf3c542d6c2fcf0aa4b8a13d24ba46dc67340c2a124023bbd94cb532971e26

  • SSDEEP

    24576:xAHnh+eWsN3skA4RV1Hom2KXMmHaLPFU1Mz+WbXk5:Ih+ZkldoPK8YaLPan

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20-EM-00- PI-INQ-3001.exe
    "C:\Users\Admin\AppData\Local\Temp\20-EM-00- PI-INQ-3001.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4740
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\20-EM-00- PI-INQ-3001.exe"
      2⤵
        PID:4348
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 764
        2⤵
        • Program crash
        PID:1444
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4740 -ip 4740
      1⤵
        PID:1948

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\aut8B48.tmp

        Filesize

        279KB

        MD5

        ca682b212e6aa6a0ce4037d2050704c7

        SHA1

        de68a7b5941ff1eda148301fcef9aed2124b3c39

        SHA256

        a4c715deeec61d98a6588c18a65818622385454dfcba470e8ccae1e8b8116263

        SHA512

        87af907f493deac90329b9c8173c7618319594b720b1950383b0ceb29e5cdc430de9b6b215d7e45a3f87916b5d09ab7640f9b31940e81ab61f798e84237d1694

      • memory/4740-13-0x0000000003EE0000-0x0000000003EE4000-memory.dmp

        Filesize

        16KB