Analysis

  • max time kernel
    93s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 02:27

General

  • Target

    4e3463135c8ca8b3570dc818ab1ab056db9d08b43e37639ad0a0e53ae6d9f052N.exe

  • Size

    1.5MB

  • MD5

    99f6acc34882adbb61226daafb5abc70

  • SHA1

    6325fbbb4584d3e45a74ac2eaec3615ffb916430

  • SHA256

    4e3463135c8ca8b3570dc818ab1ab056db9d08b43e37639ad0a0e53ae6d9f052

  • SHA512

    bdf5fe162d7ec550a5c5a58b5b452d53f78b90bcdaa388f152b870afec84c768148aab4d7214c3cb1da87db2890d12737bacd0c2550e24bd95b29769a702f054

  • SSDEEP

    3072:8gV7qqpZXXRvjxCb5NgXDY7uSlkJcUa7kYQTcqW2NdQQGH/UDhSCUc4aqTB891gv:V1rlKgzelZNQSBQGH/CSpWqTVmQ

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 10 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e3463135c8ca8b3570dc818ab1ab056db9d08b43e37639ad0a0e53ae6d9f052N.exe
    "C:\Users\Admin\AppData\Local\Temp\4e3463135c8ca8b3570dc818ab1ab056db9d08b43e37639ad0a0e53ae6d9f052N.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    PID:2052
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 916
      2⤵
      • Program crash
      PID:4408
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2052 -ip 2052
    1⤵
      PID:384

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\7-Zip\7z.cab

      Filesize

      544KB

      MD5

      9a1dd1d96481d61934dcc2d568971d06

      SHA1

      f136ef9bf8bd2fc753292fb5b7cf173a22675fb3

      SHA256

      8cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525

      SHA512

      7ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa

    • C:\Program Files\7-Zip\7z.exe

      Filesize

      288KB

      MD5

      8af24ca2375b93eba795225f81a0ced2

      SHA1

      f4ca3165bd0a6112fb87d4555e7ee75214af4be8

      SHA256

      0158bddb2e3dd70d509c25f07ce6bc8bb091b3ba80f3e8e26ec47db0394f9072

      SHA512

      05c49e0b4dd5b5a5652c08e987c1900e63f116745d72656d7543c84479bbad9391c39611dee130bc4319cba460e5d8c34840fccb84876e16b80bfcae059d5ae8

    • C:\Program Files\7-Zip\7zFM.cab

      Filesize

      930KB

      MD5

      30ac0b832d75598fb3ec37b6f2a8c86a

      SHA1

      6f47dbfd6ff36df7ba581a4cef024da527dc3046

      SHA256

      1ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74

      SHA512

      505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057

    • C:\Program Files\7-Zip\7zFM.exe

      Filesize

      1.5MB

      MD5

      65cad70578501b698f663bd987b113eb

      SHA1

      4eb128008ddbd069f2a611e7022bab6111b01780

      SHA256

      c67c47ecb4d3a13353f41d780ccf8595622096875a694642557ef3f2b8780f55

      SHA512

      8a77ebd517c4cf8db2ebbf93fb570881154a8272b5fb2190d80490dfa24d795acfc2a80f5264c491e5d2610cc0fbeebf65b2ef62b70bb1508db3003146c12dc7

    • C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.cab

      Filesize

      2.1MB

      MD5

      b8d69fa2755c3ab1f12f8866a8e2a4f7

      SHA1

      8e3cdfb20e158c2906323ba0094a18c7dd2aaf2d

      SHA256

      7e0976036431640ae1d9f1c0b52bcea5dd37ef86cd3f5304dc8a96459d9483cd

      SHA512

      5acac46068b331216978500f67a7fa5257bc5b05133fab6d88280b670ae4885ef2d5d1f531169b66bf1952e082f56b1ad2bc3901479b740f96c53ea405adda18

    • memory/2052-0-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2052-67-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB