Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe
Resource
win10v2004-20240802-en
General
-
Target
0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe
-
Size
1.1MB
-
MD5
d7d20f5633562e2734a5c5708c0de4dc
-
SHA1
94604404e30d61b3ccf93ab295ce6f16b3ace044
-
SHA256
0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56
-
SHA512
ab5c42326258620c3546c55a4e1976d8043f124b9ae56342630393b672c8a8380ff085a49138f1c6c202b9a150b4cfd3362f5ed7860640110806f19cf3dbfc49
-
SSDEEP
24576:8AHnh+eWsN3skA4RV1Hom2KXMmHawemjZrj1YfNEB4V5:bh+ZkldoPK8Yawtrfc
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1956 set thread context of 1696 1956 0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 3436 1956 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1696 svchost.exe 1696 svchost.exe 1696 svchost.exe 1696 svchost.exe 1696 svchost.exe 1696 svchost.exe 1696 svchost.exe 1696 svchost.exe 1696 svchost.exe 1696 svchost.exe 1696 svchost.exe 1696 svchost.exe 1696 svchost.exe 1696 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1956 0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1956 0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe 1956 0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1956 0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe 1956 0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1696 1956 0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe 86 PID 1956 wrote to memory of 1696 1956 0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe 86 PID 1956 wrote to memory of 1696 1956 0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe 86 PID 1956 wrote to memory of 1696 1956 0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe"C:\Users\Admin\AppData\Local\Temp\0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 7762⤵
- Program crash
PID:3436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1956 -ip 19561⤵PID:1752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5eabbd33ba170ee93510d3716bdac7997
SHA1cb4c1d486029b108b89dbf604fdb0e5dec42976f
SHA256213952fff3106a6615e788d961aa56d9947034463e7ce0cbdee4fe576b1cf593
SHA5124a31d33a326f3acc5053e395df851005be078a9e2263dedf7c8b1e900296d3045bd11741b4c962063a677a4dd37a97b24b509fe730b15b713bc16ceb89b0de6f