Analysis
-
max time kernel
110s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
6f90448948173daeff012b3a0b1fae40N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6f90448948173daeff012b3a0b1fae40N.exe
Resource
win10v2004-20240802-en
General
-
Target
6f90448948173daeff012b3a0b1fae40N.exe
-
Size
9.9MB
-
MD5
6f90448948173daeff012b3a0b1fae40
-
SHA1
0251ca8f9f0ae46b2d7e05bbf2589e02ba625c98
-
SHA256
7907b91848546b664bf2029fc46f9bf35f429019dd1189324b57a39bf826fc68
-
SHA512
314a1b33d8690263435f518b546abedcf3e4d5c854bee8006a5f0a530571b52c4c4ade06c3e74c7b1ef5286720b677bb9763090c858bb4dd6b28eee2324967e6
-
SSDEEP
98304:ENH57vTrdT25v0rw/kilZtuncGu/Vw0wen+:aHx1zG+
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6f90448948173daeff012b3a0b1fae40N.exe -
Loads dropped DLL 1 IoCs
pid Process 3044 6f90448948173daeff012b3a0b1fae40N.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 3044 6f90448948173daeff012b3a0b1fae40N.exe 3044 6f90448948173daeff012b3a0b1fae40N.exe 3044 6f90448948173daeff012b3a0b1fae40N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 8744 3044 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f90448948173daeff012b3a0b1fae40N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 8744 3044 6f90448948173daeff012b3a0b1fae40N.exe 31 PID 3044 wrote to memory of 8744 3044 6f90448948173daeff012b3a0b1fae40N.exe 31 PID 3044 wrote to memory of 8744 3044 6f90448948173daeff012b3a0b1fae40N.exe 31 PID 3044 wrote to memory of 8744 3044 6f90448948173daeff012b3a0b1fae40N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f90448948173daeff012b3a0b1fae40N.exe"C:\Users\Admin\AppData\Local\Temp\6f90448948173daeff012b3a0b1fae40N.exe"1⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 922⤵
- Program crash
PID:8744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024B
MD512871388b682b159ddd85545302a289d
SHA176b47377da188fcfddeefa0f940287f1cce9885d
SHA256cc033f00e96cae1829e3a5c15150fe68a62f65440f1b158d9257370fbc488a9b
SHA512d60953b62d08e52fa2860db257e2bdbaa97e7eff7007617857f7b30a76f7c7ba81f8444d313a6ad496adbbaede5af1661e72522046789bb9aee1340f7ac12c7d