Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 18:19
Static task
static1
Behavioral task
behavioral1
Sample
d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe
Resource
win10v2004-20240802-en
General
-
Target
d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe
-
Size
1.4MB
-
MD5
5ebf4fc104570b9074cf54840814513a
-
SHA1
20fdbbcc1a274f44f7f7458f609c7d0758f5370e
-
SHA256
d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404
-
SHA512
40f090006c9f6ab924aa80fa245f12f2b8298d21b5a284fd3d1b917dd2d9f95102fb74bc9273f9c3f3882a787286184bd5f1159a5dbfe9eb408920a7fa700460
-
SSDEEP
24576:KqDEvCTbMWu7rQYlBQcBiT6rprG8afv5vPHMq0F/IW7m9T:KTvC/MTQYxsWR7af1CIwm
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system.vbs system.exe -
Executes dropped EXE 1 IoCs
pid Process 2016 system.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023413-16.dat autoit_exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4616 2016 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3164 d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe 3164 d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe 2016 system.exe 2016 system.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3164 d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe 3164 d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe 2016 system.exe 2016 system.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3164 wrote to memory of 2016 3164 d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe 82 PID 3164 wrote to memory of 2016 3164 d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe 82 PID 3164 wrote to memory of 2016 3164 d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe 82 PID 2016 wrote to memory of 264 2016 system.exe 83 PID 2016 wrote to memory of 264 2016 system.exe 83 PID 2016 wrote to memory of 264 2016 system.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe"C:\Users\Admin\AppData\Local\Temp\d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\directory\system.exe"C:\Users\Admin\AppData\Local\Temp\d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe"3⤵PID:264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 7243⤵
- Program crash
PID:4616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2016 -ip 20161⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD5cd5ddb4993df5199ca4ab3202dca2bc0
SHA15f24ef82f9a0ad9b8e4d8d0a82bb5cbfc7eccb94
SHA256e5f8566332f69d6f5372205c195ffd8d27186f05432d25cc6318373e47d99c54
SHA512e3777f32960551d54a07e4ad9adb1247fb16605c381ea842c1766129e75ce65af6e1fa9939b653692a2ca5221e514d4a235245dcdb34fc82ae88b4c72b88bda4
-
Filesize
28KB
MD5f347cfb4a51564404350e6b76698992f
SHA1e3b8a1a0f71a8fac13e1e5824a927d91ad7b9266
SHA256a34fb7e27db35a62bc83db780e79487be8ac81cd2d1f6ad850ab02ca5476f8be
SHA5127254c951414ffc87372ab165fe714b66a9ecdcc695fadfe5848fc4bdb6d0a4bbcce8064ca6e8d9abee1ff62d257a02301bfeeb6d63434bea6bbe1f97e5f20c97
-
Filesize
1.4MB
MD55ebf4fc104570b9074cf54840814513a
SHA120fdbbcc1a274f44f7f7458f609c7d0758f5370e
SHA256d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404
SHA51240f090006c9f6ab924aa80fa245f12f2b8298d21b5a284fd3d1b917dd2d9f95102fb74bc9273f9c3f3882a787286184bd5f1159a5dbfe9eb408920a7fa700460