Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe
Resource
win10v2004-20240802-en
General
-
Target
49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe
-
Size
1.1MB
-
MD5
be21a609ca8e78ad2cc7694d0c043460
-
SHA1
d741b5a9fd8c34b1dc3aa3c2636936dd73bef471
-
SHA256
49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcd
-
SHA512
c294951a4c1d95832b28751997b71f81b4099e761938de030931cce2e4d3187570cabd54eb07704c3ab2674d1a39b6b38a70403611499cc244ea6dd3018a82e3
-
SSDEEP
12288:qTYDc+fmxhC/M4LIBdjlDa/ZS7W+iniF+G4V:qTYDZmxc/M4MTa/ZS7W+iniF+t
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3036 49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe -
Executes dropped EXE 1 IoCs
pid Process 3036 49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe -
Loads dropped DLL 4 IoCs
pid Process 2936 49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe 2188 WerFault.exe 2188 WerFault.exe 2188 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2188 3036 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2936 49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3036 49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2936 wrote to memory of 3036 2936 49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe 31 PID 2936 wrote to memory of 3036 2936 49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe 31 PID 2936 wrote to memory of 3036 2936 49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe 31 PID 2936 wrote to memory of 3036 2936 49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe 31 PID 3036 wrote to memory of 2188 3036 49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe 32 PID 3036 wrote to memory of 2188 3036 49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe 32 PID 3036 wrote to memory of 2188 3036 49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe 32 PID 3036 wrote to memory of 2188 3036 49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe"C:\Users\Admin\AppData\Local\Temp\49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exeC:\Users\Admin\AppData\Local\Temp\49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:2188
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\49944e04816e49e3f64e2d8106ae187b22622eb5c85a22195ddd15a6c19cbdcdN.exe
Filesize1.1MB
MD5afa7a2059aa43a4c1020299c2ee28b41
SHA118b72e34c6127915b21ad5b5be736195a202667b
SHA256e144eed234adf284d364c10f2020d6f9c664a88bb350fb638c61af2334d6b036
SHA5123aa4804ca78bbf74188e2772eacf0999a6435e9406a44a824083897328530ddabb5cc5f80d4ce43c8c518e88ace27c95c5b8f0621324f1de9cc5718d37e1dbee