Analysis
-
max time kernel
118s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 07:48
Behavioral task
behavioral1
Sample
020201ec7af31f0192c4c7b9d4ff88f0N.exe
Resource
win7-20240903-en
8 signatures
120 seconds
General
-
Target
020201ec7af31f0192c4c7b9d4ff88f0N.exe
-
Size
34KB
-
MD5
020201ec7af31f0192c4c7b9d4ff88f0
-
SHA1
2f75b57eb18a18244b6ee2def14cc3f1b00096bc
-
SHA256
7dec99f552ae915e8d893117def085503389c677c6be34de129491a7b9fc8872
-
SHA512
406bcc4256b4fbdb716a6f013e8cb713d902e36e1c07b88c75a5b45876b0b5d1078e8ef8049edf2695461785b2e1072791f3a5fbfdb8bbdd2de455d20ebb2afc
-
SSDEEP
768:Mp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:MpYoX58z1uirL98xMWnT0OQ9J2
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1060-0-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\35AE92E1 = "C:\\Users\\Admin\\AppData\\Roaming\\35AE92E1\\bin.exe" winver.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2580 4776 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 020201ec7af31f0192c4c7b9d4ff88f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4776 winver.exe 4776 winver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3472 Explorer.EXE Token: SeCreatePagefilePrivilege 3472 Explorer.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4776 winver.exe 3472 Explorer.EXE 3472 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3472 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1060 wrote to memory of 4776 1060 020201ec7af31f0192c4c7b9d4ff88f0N.exe 85 PID 1060 wrote to memory of 4776 1060 020201ec7af31f0192c4c7b9d4ff88f0N.exe 85 PID 1060 wrote to memory of 4776 1060 020201ec7af31f0192c4c7b9d4ff88f0N.exe 85 PID 1060 wrote to memory of 4776 1060 020201ec7af31f0192c4c7b9d4ff88f0N.exe 85 PID 4776 wrote to memory of 3472 4776 winver.exe 56 PID 4776 wrote to memory of 2628 4776 winver.exe 50
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2628
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\020201ec7af31f0192c4c7b9d4ff88f0N.exe"C:\Users\Admin\AppData\Local\Temp\020201ec7af31f0192c4c7b9d4ff88f0N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 3524⤵
- Program crash
PID:2580
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4776 -ip 47761⤵PID:4888