Analysis
-
max time kernel
118s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
6ed5b133b63ed30854248d26f97323b0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6ed5b133b63ed30854248d26f97323b0N.exe
Resource
win10v2004-20240910-en
General
-
Target
6ed5b133b63ed30854248d26f97323b0N.exe
-
Size
89KB
-
MD5
6ed5b133b63ed30854248d26f97323b0
-
SHA1
ae84083eb5108a498c75cf0779ab95ba0ec61843
-
SHA256
b30dbd2484304df0b5c94d7c634b706aa1944bcd16e8d5a82bc16c174ab43c32
-
SHA512
b4a6fb57aaeadc6132ae173654f51606dd850d4bdf86b2c150483976fcf0dc48b165372a6f12ea7f1f776484ac572d4eabce7cd73046ce5e1119d3807ae144c7
-
SSDEEP
1536:j9o65gQK3Zm+Mt9RV5O8oQ9cXFunGm6ManhFLnBqHan6owwosTk8vxA:j9o6fK2XqXQwhnHlqQo8Lvy
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 5004 4856 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ed5b133b63ed30854248d26f97323b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4856 winver.exe 4856 winver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3460 Explorer.EXE Token: SeCreatePagefilePrivilege 3460 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4856 winver.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3460 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3044 wrote to memory of 4856 3044 6ed5b133b63ed30854248d26f97323b0N.exe 84 PID 3044 wrote to memory of 4856 3044 6ed5b133b63ed30854248d26f97323b0N.exe 84 PID 3044 wrote to memory of 4856 3044 6ed5b133b63ed30854248d26f97323b0N.exe 84 PID 3044 wrote to memory of 4856 3044 6ed5b133b63ed30854248d26f97323b0N.exe 84 PID 4856 wrote to memory of 3460 4856 winver.exe 56 PID 4856 wrote to memory of 2588 4856 winver.exe 44
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2588
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\6ed5b133b63ed30854248d26f97323b0N.exe"C:\Users\Admin\AppData\Local\Temp\6ed5b133b63ed30854248d26f97323b0N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 6404⤵
- Program crash
PID:5004
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4856 -ip 48561⤵PID:2368