Analysis
-
max time kernel
93s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 13:27
Static task
static1
Behavioral task
behavioral1
Sample
850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe
Resource
win10v2004-20240802-en
General
-
Target
850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe
-
Size
37KB
-
MD5
922ddb400915ecc12148b5502b5b7748
-
SHA1
23048047f7fd4cbfa20269a89e9aa61ddc623815
-
SHA256
850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3
-
SHA512
b6e37b5b14f4451bc9f13aa056c489c887cfd6f9694d12ce8cacd4f1f4df546e72e32ae6bfe793ba496f62d6bf836307f181a2b6e85ed528d88f7bbc7b74e05d
-
SSDEEP
384:84Uo92aul8VctMCqTX3xAkSVE6B95rfRqzhBaSUR4WVJl/vrseE7GNb9n:84U6ulPg6XO66WRqUZ
Malware Config
Signatures
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1932 set thread context of 4460 1932 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 4740 4460 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1932 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2944 1932 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe 82 PID 1932 wrote to memory of 2944 1932 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe 82 PID 1932 wrote to memory of 2944 1932 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe 82 PID 2944 wrote to memory of 3984 2944 csc.exe 84 PID 2944 wrote to memory of 3984 2944 csc.exe 84 PID 2944 wrote to memory of 3984 2944 csc.exe 84 PID 1932 wrote to memory of 4460 1932 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe 85 PID 1932 wrote to memory of 4460 1932 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe 85 PID 1932 wrote to memory of 4460 1932 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe 85 PID 1932 wrote to memory of 4460 1932 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe 85 PID 1932 wrote to memory of 4460 1932 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe 85 PID 1932 wrote to memory of 4460 1932 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe 85 PID 1932 wrote to memory of 4460 1932 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe 85 PID 1932 wrote to memory of 4460 1932 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe 85 PID 1932 wrote to memory of 4460 1932 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe 85 PID 1932 wrote to memory of 4460 1932 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe 85 PID 1932 wrote to memory of 4460 1932 850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe"C:\Users\Admin\AppData\Local\Temp\850f464e8c0fc382d8c597c1c6f3d4ccc74498176e2302b94c850f8235c658b3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ekaj1xzz\ekaj1xzz.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES858B.tmp" "c:\Users\Admin\AppData\Local\Temp\ekaj1xzz\CSC6DB5DE00D2AB4B7C87B8D9E3C45E78E.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3984
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 6163⤵
- Program crash
PID:4740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4460 -ip 44601⤵PID:3656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53fda785fecb3e8d3f4def1eaf45eb742
SHA19f3974b99f909968e5fdae4a669c5e536e24d5d6
SHA2567fcce4fc6f8956471748c8f9cce64cd579a64e2cb7657aaf3f1103b88a33f8a8
SHA512d7e11d53a27ddbe3e69056d30a602c1d8edacef887002d098c62a7bcb0cf3cb54c95417eb4a40fba1a068938c490938cbe04447c26e1e32d0eb035be088209b4
-
Filesize
9KB
MD54fb69e4c9a8be816005ebee141f518e4
SHA13072e6d375b391d588846bc37198f275f757f811
SHA25612f541d82e5d0f0b670b507158afc4159ac66e9dd964229f31a712fefbf23d16
SHA5127f900cd83b1a45519a63055772c5e42ba0e8fd223313fd648e21270e8112e2a993f96ab953d6caac5526d94365c9382b551552df1bd00a0cf4fb9014a6db3a6c
-
Filesize
652B
MD5f649aac3f2439c35b701ef60f95310c2
SHA1b4003c85ba387d1565e02af49b276456b15cf7e1
SHA256e67ba7d323aa9148274376e2a4a20e7fd39d42994c79255f6c4248e45a87d32f
SHA5120bb29d9e70901b3776b536423cc3df9468cf72f9ab09def21e9daf2ded81eb07caa3aa9f7e1a9823fd89b2ba35ed44394d8e106e2df99b6173ad93fd7aa00eea
-
Filesize
10KB
MD51b6ac34c4169b5a34200e793d21182e6
SHA17a195f13804f6d4f38774b2a94962faa2f6c03e6
SHA25638eca887cb1764ceccab157b44915f0a41760c843c530a72d66ee414a9a61296
SHA512454f50f81b31594855c7bf2b6168c7a4ead6e83e4c60cf7f49c54a4a6378ba7946b00b9336b3ffa9c390fc85ea4305577093411448a68cb0d8280b115ea0dd58
-
Filesize
204B
MD5270055309b577ca3f6cdd56397585add
SHA1944d98fee2a871d42875ac358a05855073b0d054
SHA2569e269f4655a050f03a7d23da6b71eb8ac596314538f6cb2f878e36a3e9149a42
SHA5129511134cdf68f9ceaba1f3b341238683835bd788d6f5bc77dd39c9d828d64897e70b978185807f90d9e09a4940cb1af1a597734fc543f44dbbce52b81387e75a