Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 02:56

General

  • Target

    b9749e2a157f33aeff5033bb98391323c6a19201b54126f608b5cfc3e2c3f6e9N.exe

  • Size

    84KB

  • MD5

    9a194b9f88e6d733e2a76f89877b5730

  • SHA1

    69b478edb21f9747e478ee5a5765fadff58fcf59

  • SHA256

    b9749e2a157f33aeff5033bb98391323c6a19201b54126f608b5cfc3e2c3f6e9

  • SHA512

    0c66ec0efeb8c361e12abea61b90844d422ec2b8a9fbff45c01a2725faf617a372766785204a5cd83850ce0867d07d3cef56812a47c19f91bf67d8744c9192b2

  • SSDEEP

    768:sv6nMfqt+K48h8jlc8ebdtF5EmpW/p/hxRSH9NxIkL9v/Q6sWDdR2iRv:sv8I8ujcZKmpSFhxRSHdL9bsSn2iRv

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9749e2a157f33aeff5033bb98391323c6a19201b54126f608b5cfc3e2c3f6e9N.exe
    "C:\Users\Admin\AppData\Local\Temp\b9749e2a157f33aeff5033bb98391323c6a19201b54126f608b5cfc3e2c3f6e9N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Users\Admin\woeluc.exe
      "C:\Users\Admin\woeluc.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4604
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 1472
      2⤵
      • Program crash
      PID:2016
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1152 -ip 1152
    1⤵
      PID:660

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\woeluc.exe

      Filesize

      84KB

      MD5

      e163cffad1d5405c9b7b9e64948034f8

      SHA1

      cd56762784cc4020ce5d670ffb3c88bbef1b0ae0

      SHA256

      9cfe159d993461e381f10dd4ef547c42321b65b19150e2089dd20361325ea0ad

      SHA512

      af49a22125de8d19ece4ac2ffd194efcd28e9af2610e52b6ad3f1ddbe1b1a06238cf298b8211b1e704047253ec55f298ce8fa1f7ed513d40deccdf5824c27f59

    • memory/1152-0-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1152-37-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4604-33-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4604-38-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB