Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:10
Static task
static1
Behavioral task
behavioral1
Sample
459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe
Resource
win10v2004-20240802-en
General
-
Target
459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe
-
Size
1.2MB
-
MD5
01284d3ef501955ac9ed679e5cb32e23
-
SHA1
b86ead0f46e939b6fbde343520133de2daaac2da
-
SHA256
459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949
-
SHA512
bd9dfbd8090b8ad102c811121250829448210ae217c4867b0b19fcc078389a72268583b918f30ee0e7e22dbe8fdbb2e53318cad90536cd435656c39bd76f586b
-
SSDEEP
24576:MqDEvCTbMWu7rQYlBQcBiT6rprG8a3ZYTVJeO4M9JvgmG:MTvC/MTQYxsWR7a3m6mx
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5116 set thread context of 3788 5116 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 4776 5116 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3788 svchost.exe 3788 svchost.exe 3788 svchost.exe 3788 svchost.exe 3788 svchost.exe 3788 svchost.exe 3788 svchost.exe 3788 svchost.exe 3788 svchost.exe 3788 svchost.exe 3788 svchost.exe 3788 svchost.exe 3788 svchost.exe 3788 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5116 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5116 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe 5116 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 5116 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe 5116 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5116 wrote to memory of 3788 5116 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe 85 PID 5116 wrote to memory of 3788 5116 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe 85 PID 5116 wrote to memory of 3788 5116 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe 85 PID 5116 wrote to memory of 3788 5116 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe"C:\Users\Admin\AppData\Local\Temp\459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 7362⤵
- Program crash
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5116 -ip 51161⤵PID:1920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD549a73306837e7ec8f98ff8493a824c40
SHA19a82f6d68e5f50a5026e74508b8b503cb0b52b94
SHA2565f53e9001b6262b634d2f91e3b7510cd2a1d8704d942e2a7d23d3b20560e35c2
SHA512104e8cf3991506e39ddef987f33d5407289da70cf0b0ec0bc4e2e5c9d309569c59115a019f7f0919e00e0932573b80e5f85105fdd47798c7a3ce53386bad7f91