Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
ea07bdce9caec7100215a36e9adbe189ec0f1bacfda7fd88e27295e88b17ba4e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea07bdce9caec7100215a36e9adbe189ec0f1bacfda7fd88e27295e88b17ba4e.exe
Resource
win10v2004-20240802-en
General
-
Target
ea07bdce9caec7100215a36e9adbe189ec0f1bacfda7fd88e27295e88b17ba4e.exe
-
Size
14KB
-
MD5
fa160459eb99fd1fe050db9b207b0a7b
-
SHA1
c60a601d7fc9d4cad19d2d7bb412e4f42bc6bdbb
-
SHA256
ea07bdce9caec7100215a36e9adbe189ec0f1bacfda7fd88e27295e88b17ba4e
-
SHA512
83e8ab164b9e7d6a60991847d68281fbd44208e25290619e14ae10e58d846898e29c7ac243fe2f5751420404279326c9754de88d166aec91bdaf5ce28baac25f
-
SSDEEP
384:SFtI3DnrYVAky6mdMPqKj8jZ9nB25gkOYBS:SFtGky6md6tj+kd
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2888 2524 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea07bdce9caec7100215a36e9adbe189ec0f1bacfda7fd88e27295e88b17ba4e.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main ea07bdce9caec7100215a36e9adbe189ec0f1bacfda7fd88e27295e88b17ba4e.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "www.master69.biz?681" ea07bdce9caec7100215a36e9adbe189ec0f1bacfda7fd88e27295e88b17ba4e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2888 2524 ea07bdce9caec7100215a36e9adbe189ec0f1bacfda7fd88e27295e88b17ba4e.exe 31 PID 2524 wrote to memory of 2888 2524 ea07bdce9caec7100215a36e9adbe189ec0f1bacfda7fd88e27295e88b17ba4e.exe 31 PID 2524 wrote to memory of 2888 2524 ea07bdce9caec7100215a36e9adbe189ec0f1bacfda7fd88e27295e88b17ba4e.exe 31 PID 2524 wrote to memory of 2888 2524 ea07bdce9caec7100215a36e9adbe189ec0f1bacfda7fd88e27295e88b17ba4e.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea07bdce9caec7100215a36e9adbe189ec0f1bacfda7fd88e27295e88b17ba4e.exe"C:\Users\Admin\AppData\Local\Temp\ea07bdce9caec7100215a36e9adbe189ec0f1bacfda7fd88e27295e88b17ba4e.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 6602⤵
- Program crash
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236B
MD585f97c25d9f3787bf3b339cfaf734153
SHA1402f28b5ad6d8114bd8eb240997dfce9da135c41
SHA256be114bb6d472104c283390f4acbb90f2308bde106cfbd7ffb5b2eb8bdcb59a24
SHA51272960a90e47d249bbc631dfeeee1579ebdc320ae91eb279217d3acd34b089a2965f29fa8f42c3216fb7db6b9766007c514be92bcf6f491bb68f69746ef460a51