Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 21:42
Static task
static1
Behavioral task
behavioral1
Sample
11b8b251393813a103ac30465b296a20N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11b8b251393813a103ac30465b296a20N.exe
Resource
win10v2004-20240802-en
General
-
Target
11b8b251393813a103ac30465b296a20N.exe
-
Size
1.2MB
-
MD5
11b8b251393813a103ac30465b296a20
-
SHA1
737126a04a75bf28f6fad9de70974e87c2b4a1bf
-
SHA256
e02d5badfc8d771117b546ea87f509e2d8268b59ba0c8df3167f70eefe85fa38
-
SHA512
c0748b6b40a70cfec292be8af822a1e523165a0022d0de3c776abf727ff90672b5f96f6cdfabb0fd75ac9bd0b77f941818e911175182769ea42a53649f6981ec
-
SSDEEP
12288:RrNZUyzQ+BPVi33u2DjlDa/ZSEniF+G4l:lNFzQtxa/ZSEniF+9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4268 11b8b251393813a103ac30465b296a20N.exe -
Executes dropped EXE 1 IoCs
pid Process 4268 11b8b251393813a103ac30465b296a20N.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 1596 1940 WerFault.exe 82 2736 4268 WerFault.exe 90 1228 4268 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11b8b251393813a103ac30465b296a20N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1940 11b8b251393813a103ac30465b296a20N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4268 11b8b251393813a103ac30465b296a20N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1940 wrote to memory of 4268 1940 11b8b251393813a103ac30465b296a20N.exe 90 PID 1940 wrote to memory of 4268 1940 11b8b251393813a103ac30465b296a20N.exe 90 PID 1940 wrote to memory of 4268 1940 11b8b251393813a103ac30465b296a20N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\11b8b251393813a103ac30465b296a20N.exe"C:\Users\Admin\AppData\Local\Temp\11b8b251393813a103ac30465b296a20N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 3442⤵
- Program crash
PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\11b8b251393813a103ac30465b296a20N.exeC:\Users\Admin\AppData\Local\Temp\11b8b251393813a103ac30465b296a20N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 3443⤵
- Program crash
PID:2736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 3443⤵
- Program crash
PID:1228
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1940 -ip 19401⤵PID:2692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4268 -ip 42681⤵PID:1560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4268 -ip 42681⤵PID:3412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5a6f9db0a3e1cb645989ea023906e28b0
SHA16e328caae8d14b4c8a9f9e703f5342e6e7efa0e2
SHA256de3893da876e5fa7898b0164811d2ba37cb50682babbf0e3bb578bcc2dd6f160
SHA512822a5c1701e954cdcdc59f790dd89b457d011b431fc8509789882a4081aa3215999b5fb86a2c6b31a2e423deef4c6e1bcbc001ad8ecfe8c59380f3b8edfd9c1f