Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
6e38dcb1b1ff13f67474445b246c8080N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6e38dcb1b1ff13f67474445b246c8080N.exe
Resource
win10v2004-20240802-en
General
-
Target
6e38dcb1b1ff13f67474445b246c8080N.exe
-
Size
448KB
-
MD5
6e38dcb1b1ff13f67474445b246c8080
-
SHA1
ad1055bcfe6cea13fafef47fb7463feb193b6516
-
SHA256
74c1f2128c5c4c21fd252f90036f002bc324af40b67cd62bee09147e92e94e00
-
SHA512
c8ee4ad501438889db9857933e1546525c30d6dd2cfd8626b9be0db4a7c9052c580c6e6f4df5d83d73e78a85bb0f07af700ad9677b45578cb73c121069a5f2d6
-
SSDEEP
12288:hL0zWFK7icxsnXlS2hRfkEG1BmVQ5zCD4TyWN9VN:hL0z2K7oXlNCEG1BmVQ5zY4xN9VN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1180 6e38dcb1b1ff13f67474445b246c8080N.exe -
Executes dropped EXE 1 IoCs
pid Process 1180 6e38dcb1b1ff13f67474445b246c8080N.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2056 3284 WerFault.exe 89 5788 1180 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e38dcb1b1ff13f67474445b246c8080N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3284 6e38dcb1b1ff13f67474445b246c8080N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1180 6e38dcb1b1ff13f67474445b246c8080N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3284 wrote to memory of 1180 3284 6e38dcb1b1ff13f67474445b246c8080N.exe 97 PID 3284 wrote to memory of 1180 3284 6e38dcb1b1ff13f67474445b246c8080N.exe 97 PID 3284 wrote to memory of 1180 3284 6e38dcb1b1ff13f67474445b246c8080N.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e38dcb1b1ff13f67474445b246c8080N.exe"C:\Users\Admin\AppData\Local\Temp\6e38dcb1b1ff13f67474445b246c8080N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 3962⤵
- Program crash
PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\6e38dcb1b1ff13f67474445b246c8080N.exeC:\Users\Admin\AppData\Local\Temp\6e38dcb1b1ff13f67474445b246c8080N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 3643⤵
- Program crash
PID:5788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3284 -ip 32841⤵PID:2872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1180 -ip 11801⤵PID:5260
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3820,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=3880 /prefetch:81⤵PID:3156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD5ceacbeb59d9068e81c9a429c39294f21
SHA1fe5979af511c64eeddd3f3a081a086d0f0575335
SHA256986a11ac76790b9d63aea5dddf7a4d4a1e0b8a35c16954cbed0817bfa7118e57
SHA512657e0a79d7b66157c85b410281a0f0d0870e6df70eaef55f89186751e72ae51297bb2f01554f42a89d4874e683083170cff073eec0abc96dc3965564a839a835