Analysis
-
max time kernel
115s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
6152da1eeabaf83d1a4a6293122dd920N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6152da1eeabaf83d1a4a6293122dd920N.exe
Resource
win10v2004-20240802-en
General
-
Target
6152da1eeabaf83d1a4a6293122dd920N.exe
-
Size
89KB
-
MD5
6152da1eeabaf83d1a4a6293122dd920
-
SHA1
0a88a13ae4537010f43da0a32558069219c9b6b0
-
SHA256
d0228da8b6f9adf124220e4d841c6e9a9cb9c9a284d92c8ee57c4647c0ee0595
-
SHA512
617373b986a2b848132e6cfb8eb688f6ad00181a83d355d335ae0827843c9f0a42231067bae8e2562f2387dadf0523df43269a86a64b7fcbd685e44779f38d04
-
SSDEEP
1536:S9o65gQK3Zm+Mt9RV5O8oQ9cXFunGm6ManhFLnBqHan6owwosTk8vxA:S9o6fK2XqXQwhnHlqQo8Lvy
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3616 4216 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6152da1eeabaf83d1a4a6293122dd920N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4216 winver.exe 4216 winver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3468 Explorer.EXE Token: SeCreatePagefilePrivilege 3468 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4216 winver.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3468 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4216 4868 6152da1eeabaf83d1a4a6293122dd920N.exe 91 PID 4868 wrote to memory of 4216 4868 6152da1eeabaf83d1a4a6293122dd920N.exe 91 PID 4868 wrote to memory of 4216 4868 6152da1eeabaf83d1a4a6293122dd920N.exe 91 PID 4868 wrote to memory of 4216 4868 6152da1eeabaf83d1a4a6293122dd920N.exe 91 PID 4216 wrote to memory of 3468 4216 winver.exe 56 PID 4216 wrote to memory of 2992 4216 winver.exe 50
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2992
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\6152da1eeabaf83d1a4a6293122dd920N.exe"C:\Users\Admin\AppData\Local\Temp\6152da1eeabaf83d1a4a6293122dd920N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 6324⤵
- Program crash
PID:3616
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4216 -ip 42161⤵PID:2676
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=2264,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=4464 /prefetch:81⤵PID:4700