Analysis
-
max time kernel
118s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 07:05
Behavioral task
behavioral1
Sample
985eb6a95289fd3bcf89cb46eca092c0N.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
985eb6a95289fd3bcf89cb46eca092c0N.exe
-
Size
45KB
-
MD5
985eb6a95289fd3bcf89cb46eca092c0
-
SHA1
94820b2797a2ef43192b7699e0986ffdccf01a6f
-
SHA256
62b57336d247afd15551e9eb9fd77a91be5bae248a143a2f22f68acf9c3244b4
-
SHA512
9bbc692895bf03d418ce29ec40b18958f2e9c404b18a108cf95e8ac7383eadf938c17ea3f0ecba6de3ac089985aee5b4af33deae0737b220bb70d8598890f2f2
-
SSDEEP
768:bhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:dsWE9N5dFu53dsniQaB/xZ14n7zIF+qr
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2236-0-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\68A8769B = "C:\\Users\\Admin\\AppData\\Roaming\\68A8769B\\bin.exe" winver.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2396 3432 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 985eb6a95289fd3bcf89cb46eca092c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3432 winver.exe 3432 winver.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3376 Explorer.EXE Token: SeCreatePagefilePrivilege 3376 Explorer.EXE Token: SeShutdownPrivilege 3376 Explorer.EXE Token: SeCreatePagefilePrivilege 3376 Explorer.EXE Token: SeShutdownPrivilege 3376 Explorer.EXE Token: SeCreatePagefilePrivilege 3376 Explorer.EXE Token: SeShutdownPrivilege 3376 Explorer.EXE Token: SeCreatePagefilePrivilege 3376 Explorer.EXE Token: SeShutdownPrivilege 3376 Explorer.EXE Token: SeCreatePagefilePrivilege 3376 Explorer.EXE Token: SeShutdownPrivilege 3376 Explorer.EXE Token: SeCreatePagefilePrivilege 3376 Explorer.EXE Token: SeShutdownPrivilege 3376 Explorer.EXE Token: SeCreatePagefilePrivilege 3376 Explorer.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3432 winver.exe 3376 Explorer.EXE 3376 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3376 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2236 wrote to memory of 3432 2236 985eb6a95289fd3bcf89cb46eca092c0N.exe 85 PID 2236 wrote to memory of 3432 2236 985eb6a95289fd3bcf89cb46eca092c0N.exe 85 PID 2236 wrote to memory of 3432 2236 985eb6a95289fd3bcf89cb46eca092c0N.exe 85 PID 2236 wrote to memory of 3432 2236 985eb6a95289fd3bcf89cb46eca092c0N.exe 85 PID 3432 wrote to memory of 3376 3432 winver.exe 56 PID 3432 wrote to memory of 2420 3432 winver.exe 43
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2420
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\985eb6a95289fd3bcf89cb46eca092c0N.exe"C:\Users\Admin\AppData\Local\Temp\985eb6a95289fd3bcf89cb46eca092c0N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 3524⤵
- Program crash
PID:2396
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3432 -ip 34321⤵PID:4552