Analysis
-
max time kernel
117s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 17:09
Behavioral task
behavioral1
Sample
65f0fc08353a2b7235ca90b709b14e10N.exe
Resource
win7-20240708-en
7 signatures
120 seconds
General
-
Target
65f0fc08353a2b7235ca90b709b14e10N.exe
-
Size
160KB
-
MD5
65f0fc08353a2b7235ca90b709b14e10
-
SHA1
b1926a1b7060e5145f5d20f7dc6a262810eb1f7f
-
SHA256
86218f57202543cf67991e36400adc7cd7050fbb67e7037c748799f211121450
-
SHA512
b23557e59c9bc9f3e4b47ca0489754a4a28dd911585ed449c341f220e8c54478033079ed3253463d7c1dfc96633aa91cd3102a281100fadd288a1253717b3b2d
-
SSDEEP
1536:EEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:3Y+4MiIkLZJNAQ9J6v
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2432-0-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0EBCA0F8 = "C:\\Users\\Admin\\AppData\\Roaming\\0EBCA0F8\\bin.exe" winver.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4104 3288 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65f0fc08353a2b7235ca90b709b14e10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3288 winver.exe 3288 winver.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3288 winver.exe 3488 Explorer.EXE 3488 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3488 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2432 wrote to memory of 3288 2432 65f0fc08353a2b7235ca90b709b14e10N.exe 85 PID 2432 wrote to memory of 3288 2432 65f0fc08353a2b7235ca90b709b14e10N.exe 85 PID 2432 wrote to memory of 3288 2432 65f0fc08353a2b7235ca90b709b14e10N.exe 85 PID 2432 wrote to memory of 3288 2432 65f0fc08353a2b7235ca90b709b14e10N.exe 85 PID 3288 wrote to memory of 3488 3288 winver.exe 56 PID 3288 wrote to memory of 2492 3288 winver.exe 42
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2492
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\65f0fc08353a2b7235ca90b709b14e10N.exe"C:\Users\Admin\AppData\Local\Temp\65f0fc08353a2b7235ca90b709b14e10N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 3524⤵
- Program crash
PID:4104
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3288 -ip 32881⤵PID:4784