Analysis
-
max time kernel
118s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
731b50a9db00916edf1609775e2f7960N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
731b50a9db00916edf1609775e2f7960N.exe
Resource
win10v2004-20240910-en
General
-
Target
731b50a9db00916edf1609775e2f7960N.exe
-
Size
89KB
-
MD5
731b50a9db00916edf1609775e2f7960
-
SHA1
9779f3353c5caf8a7b884403a461ea52d80d4212
-
SHA256
8829fa0de57142048046cb4d4ff30599d804d58886a2848b5c78893063cc9331
-
SHA512
2c9586f971b7e471a42e42b31ef07020734359a73ab78b2220bb5c3600d8454970e42aea3c7c0804164804842af2868b4290f319898811fe338d21f240124d39
-
SSDEEP
1536:C9o65gQK3Zm+Mt9RV5O8oQ9cXFunGm6ManhFLnBqHan6owwosTk8vxA:C9o6fK2XqXQwhnHlqQo8Lvy
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3300 5020 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 731b50a9db00916edf1609775e2f7960N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5020 winver.exe 5020 winver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3516 Explorer.EXE Token: SeCreatePagefilePrivilege 3516 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5020 winver.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3516 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2232 wrote to memory of 5020 2232 731b50a9db00916edf1609775e2f7960N.exe 84 PID 2232 wrote to memory of 5020 2232 731b50a9db00916edf1609775e2f7960N.exe 84 PID 2232 wrote to memory of 5020 2232 731b50a9db00916edf1609775e2f7960N.exe 84 PID 2232 wrote to memory of 5020 2232 731b50a9db00916edf1609775e2f7960N.exe 84 PID 5020 wrote to memory of 3516 5020 winver.exe 56 PID 5020 wrote to memory of 2556 5020 winver.exe 44
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2556
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\731b50a9db00916edf1609775e2f7960N.exe"C:\Users\Admin\AppData\Local\Temp\731b50a9db00916edf1609775e2f7960N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 6324⤵
- Program crash
PID:3300
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5020 -ip 50201⤵PID:4472