Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 00:14
Static task
static1
Behavioral task
behavioral1
Sample
f1337cad3319668215e2ba276e98a810N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f1337cad3319668215e2ba276e98a810N.exe
Resource
win10v2004-20240802-en
General
-
Target
f1337cad3319668215e2ba276e98a810N.exe
-
Size
203KB
-
MD5
f1337cad3319668215e2ba276e98a810
-
SHA1
fbed62d2c4fd8a50a377881cd01a4a1ca91b7d7a
-
SHA256
b341cbb98a0bbc8ae93cb08ab1a526ecdfd1601c3e20ce8974231e82e670aef5
-
SHA512
8aa8f09a413dc5153cc3994fafb57a6ad0fd91c29a03121cb5db3133e0de6c246bf01359ef25e695d40ca488839f1ec50830d4acbf5a9ffcb5a673b8e0172a58
-
SSDEEP
6144:GW7cvST8OkgGCkOC7i+m3dYl9Y+mjnG1B78:R7MnmGCkv++U6Y+mzG1BA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3592 f1337cad3319668215e2ba276e98a810N.exe -
Executes dropped EXE 1 IoCs
pid Process 3592 f1337cad3319668215e2ba276e98a810N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4564 5084 WerFault.exe 83 4976 3592 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1337cad3319668215e2ba276e98a810N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5084 f1337cad3319668215e2ba276e98a810N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3592 f1337cad3319668215e2ba276e98a810N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5084 wrote to memory of 3592 5084 f1337cad3319668215e2ba276e98a810N.exe 90 PID 5084 wrote to memory of 3592 5084 f1337cad3319668215e2ba276e98a810N.exe 90 PID 5084 wrote to memory of 3592 5084 f1337cad3319668215e2ba276e98a810N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1337cad3319668215e2ba276e98a810N.exe"C:\Users\Admin\AppData\Local\Temp\f1337cad3319668215e2ba276e98a810N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 3962⤵
- Program crash
PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\f1337cad3319668215e2ba276e98a810N.exeC:\Users\Admin\AppData\Local\Temp\f1337cad3319668215e2ba276e98a810N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 3723⤵
- Program crash
PID:4976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 5084 -ip 50841⤵PID:772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3592 -ip 35921⤵PID:3672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203KB
MD570d7b0c9042383d64fdc5959865b3981
SHA15899629a37288e8df3cb238cd4cddd6f2d71da55
SHA2569f17ebacadf4c00ad67a6764775c298b9f90ba9d383e26eb485d950d9a1babf0
SHA5121f5cdaf5e3fa51cc70fd0fc77e741fc958fbb918575cacc4608876b6f16db5f01e71cb928f8ec9c8831c4e3e5b74f3786b658b12b81d8d48fbdfd485cc5f6e32