Analysis
-
max time kernel
118s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 04:37
Behavioral task
behavioral1
Sample
967cb8aef0dc565b6a8d6933270ad710N.exe
Resource
win7-20240729-en
7 signatures
120 seconds
General
-
Target
967cb8aef0dc565b6a8d6933270ad710N.exe
-
Size
45KB
-
MD5
967cb8aef0dc565b6a8d6933270ad710
-
SHA1
a01cbc83118379e325647d188ddd23fadcd7c237
-
SHA256
94edb2dd4de928a03c2c224cf16575dd65bf5da9344cf8e3ed546461fcee1052
-
SHA512
e21cec1e1223477a5f4398ed9920832748bf8fed3c6d381f195d91a4e7b0b8fab56a230f009fc2499df6afeecd766c5d5deb2dfdd969ddee26ec6422c1ddfd8c
-
SSDEEP
768:0hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:4sWE9N5dFu53dsniQaB/xZ14n7zIF+qr
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1960-0-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8E9DFC40 = "C:\\Users\\Admin\\AppData\\Roaming\\8E9DFC40\\bin.exe" winver.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2184 4760 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 967cb8aef0dc565b6a8d6933270ad710N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4760 winver.exe 4760 winver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4760 winver.exe 3416 Explorer.EXE 3416 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3416 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1960 wrote to memory of 4760 1960 967cb8aef0dc565b6a8d6933270ad710N.exe 86 PID 1960 wrote to memory of 4760 1960 967cb8aef0dc565b6a8d6933270ad710N.exe 86 PID 1960 wrote to memory of 4760 1960 967cb8aef0dc565b6a8d6933270ad710N.exe 86 PID 1960 wrote to memory of 4760 1960 967cb8aef0dc565b6a8d6933270ad710N.exe 86 PID 4760 wrote to memory of 3416 4760 winver.exe 56 PID 4760 wrote to memory of 2548 4760 winver.exe 44
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2548
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\967cb8aef0dc565b6a8d6933270ad710N.exe"C:\Users\Admin\AppData\Local\Temp\967cb8aef0dc565b6a8d6933270ad710N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 3524⤵
- Program crash
PID:2184
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4760 -ip 47601⤵PID:432