Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
d3f97f414643b15b21b1601edf572f76b912ef5a3166226e7706c50b789281ccN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3f97f414643b15b21b1601edf572f76b912ef5a3166226e7706c50b789281ccN.exe
Resource
win10v2004-20240802-en
General
-
Target
d3f97f414643b15b21b1601edf572f76b912ef5a3166226e7706c50b789281ccN.exe
-
Size
193KB
-
MD5
f0ef5977b47f6e0fced9c375e030da30
-
SHA1
a9176e3751b76b1caa38f64e0a31451da29b98e4
-
SHA256
d3f97f414643b15b21b1601edf572f76b912ef5a3166226e7706c50b789281cc
-
SHA512
dd43f644575bda81db97a980f89aadbad75a4bf10ab35c6bc57c0c47f96215e1b73df2e24cfd5f55602e118efdd9e9c6854b8da0d16552f0b9ff65c11a21314a
-
SSDEEP
3072:FKBYqKA1fjID6YxDrpuboYuooDwRiZhRI99FpfmB99B1:kBxpm6UcojZh6rGP1
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\svflooje.exe d3f97f414643b15b21b1601edf572f76b912ef5a3166226e7706c50b789281ccN.exe -
Executes dropped EXE 1 IoCs
pid Process 2424 svflooje.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\keys.ini d3f97f414643b15b21b1601edf572f76b912ef5a3166226e7706c50b789281ccN.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2912 2424 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svflooje.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2912 2424 svflooje.exe 29 PID 2424 wrote to memory of 2912 2424 svflooje.exe 29 PID 2424 wrote to memory of 2912 2424 svflooje.exe 29 PID 2424 wrote to memory of 2912 2424 svflooje.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3f97f414643b15b21b1601edf572f76b912ef5a3166226e7706c50b789281ccN.exe"C:\Users\Admin\AppData\Local\Temp\d3f97f414643b15b21b1601edf572f76b912ef5a3166226e7706c50b789281ccN.exe"1⤵
- Drops file in Drivers directory
- Drops file in Windows directory
PID:1648
-
C:\Windows\SysWOW64\drivers\svflooje.exeC:\Windows\SysWOW64\drivers\svflooje.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 2002⤵
- Program crash
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193KB
MD5f0ef5977b47f6e0fced9c375e030da30
SHA1a9176e3751b76b1caa38f64e0a31451da29b98e4
SHA256d3f97f414643b15b21b1601edf572f76b912ef5a3166226e7706c50b789281cc
SHA512dd43f644575bda81db97a980f89aadbad75a4bf10ab35c6bc57c0c47f96215e1b73df2e24cfd5f55602e118efdd9e9c6854b8da0d16552f0b9ff65c11a21314a