Analysis
-
max time kernel
118s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 22:19
Behavioral task
behavioral1
Sample
f5cbc3bc10982f37113ad3668b1636f0N.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
f5cbc3bc10982f37113ad3668b1636f0N.exe
-
Size
110KB
-
MD5
f5cbc3bc10982f37113ad3668b1636f0
-
SHA1
9904644e65d8490b42c9b97e84b8ae044be74293
-
SHA256
7de6d73a488d4f752b3c97c09267b013b465fd271838c9fcc51cefdaf00003fa
-
SHA512
ea8d56cfba10e1849b910bc50175714e6b840f90517e876a24411e9627ff01760cff40402a7d3cc5d73c433deca7c6b0a693b1883bcf2d9e5285fb273bc9519f
-
SSDEEP
1536:niLOvRmmQegJgBbmAQ256/ZrwWnwqjhurmKFcxL8JQ28SGd:niyvRmeLs/ZrwWJjAqGcRJ2xS
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1804-0-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C842F6F8 = "C:\\Users\\Admin\\AppData\\Roaming\\C842F6F8\\bin.exe" winver.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4484 1172 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5cbc3bc10982f37113ad3668b1636f0N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1172 winver.exe 1172 winver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3448 Explorer.EXE Token: SeCreatePagefilePrivilege 3448 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1172 winver.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3448 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1804 wrote to memory of 1172 1804 f5cbc3bc10982f37113ad3668b1636f0N.exe 85 PID 1804 wrote to memory of 1172 1804 f5cbc3bc10982f37113ad3668b1636f0N.exe 85 PID 1804 wrote to memory of 1172 1804 f5cbc3bc10982f37113ad3668b1636f0N.exe 85 PID 1804 wrote to memory of 1172 1804 f5cbc3bc10982f37113ad3668b1636f0N.exe 85 PID 1172 wrote to memory of 3448 1172 winver.exe 56 PID 1172 wrote to memory of 3060 1172 winver.exe 50
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3060
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\f5cbc3bc10982f37113ad3668b1636f0N.exe"C:\Users\Admin\AppData\Local\Temp\f5cbc3bc10982f37113ad3668b1636f0N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 3524⤵
- Program crash
PID:4484
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1172 -ip 11721⤵PID:4704