Analysis

  • max time kernel
    95s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/09/2024, 00:33

General

  • Target

    375250940f21e326306ec8a787e20340N.exe

  • Size

    755KB

  • MD5

    375250940f21e326306ec8a787e20340

  • SHA1

    d42d5c852a0b35a6abd66b68cdcf2625f179c11c

  • SHA256

    fa4f0f96d077983bf51a57b695266c2d2b7fb891ef5ee3ea2998612e3185f8b5

  • SHA512

    3b7018428e2f2a910c75147507508ebad7f593cba4f7befe063799917f5e5fc16233bc0a96cefa249d09b290a96570ed148985087b9114c8f61f13bd5708f94a

  • SSDEEP

    12288:NvdWGIX0r3J6avozgsskFERPS50YfH3+trBbwp0fNOO1lAnhM6j8XC12Xr9jvg0I:N1WBE8av2xsSEZ8ZfXMrBbw2Llj6279W

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\375250940f21e326306ec8a787e20340N.exe
    "C:\Users\Admin\AppData\Local\Temp\375250940f21e326306ec8a787e20340N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:5040
    • C:\Users\Admin\AppData\Local\Temp\is-VANKG.tmp\375250940f21e326306ec8a787e20340N.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-VANKG.tmp\375250940f21e326306ec8a787e20340N.tmp" /SL5="$60112,753883,56832,C:\Users\Admin\AppData\Local\Temp\375250940f21e326306ec8a787e20340N.exe"
      2⤵
      • Executes dropped EXE
      PID:2184
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 480
      2⤵
      • Program crash
      PID:1760
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5040 -ip 5040
    1⤵
      PID:2800

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\is-VANKG.tmp\375250940f21e326306ec8a787e20340N.tmp

      Filesize

      44KB

      MD5

      2735608ea6321b0a138feb125827d23d

      SHA1

      218f6ddca1c8369a42c34dfbe5b7027f19585daa

      SHA256

      6df1fc99eee69cc54ea2a9b846aa8f517ae5c9402f8cf4497a12206be59cce4d

      SHA512

      b23f48834306b437189e151d17d8b76673ccfda0719532e21ff8763d05eca0fedbc5f6de8bcef1f65cc0610329b2304bbc7da24e80e65f57e12a4e68de20e46d

    • memory/5040-0-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/5040-3-0x0000000000401000-0x000000000040B000-memory.dmp

      Filesize

      40KB

    • memory/5040-6-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB