Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 06:10
Static task
static1
Behavioral task
behavioral1
Sample
お見積り依頼.exe
Resource
win7-20240903-en
General
-
Target
お見積り依頼.exe
-
Size
617KB
-
MD5
7c1e195506cf284e5b49c8b3233a17ca
-
SHA1
21965a5bbbb0eb10a8943e0f0ad80f5077a87695
-
SHA256
759bf48589770e15226a694e1d8ea23a58e69f5121958eb692c68d46a59a25b4
-
SHA512
e785e17bee1abdc476ef3e12f76d5b77113ad318c4a0feb1f6a4f6060bf2ab0643d8af2d38c7718f83cbf60f0cbcb2b40037cccf9ef05b4d4aac62a8f551e27d
-
SSDEEP
12288:B5oRpQVnipnobW7NGzGW9x252e96CjrzhnheagXJ:joUnKCqVvT8I/UJ
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2768 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 292 2088 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language お見積り依頼.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2088 お見積り依頼.exe 2088 お見積り依頼.exe 2088 お見積り依頼.exe 2768 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2088 お見積り依頼.exe Token: SeDebugPrivilege 2768 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2768 2088 お見積り依頼.exe 31 PID 2088 wrote to memory of 2768 2088 お見積り依頼.exe 31 PID 2088 wrote to memory of 2768 2088 お見積り依頼.exe 31 PID 2088 wrote to memory of 2768 2088 お見積り依頼.exe 31 PID 2088 wrote to memory of 292 2088 お見積り依頼.exe 33 PID 2088 wrote to memory of 292 2088 お見積り依頼.exe 33 PID 2088 wrote to memory of 292 2088 お見積り依頼.exe 33 PID 2088 wrote to memory of 292 2088 お見積り依頼.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\お見積り依頼.exe"C:\Users\Admin\AppData\Local\Temp\お見積り依頼.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\お見積り依頼.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 8562⤵
- Program crash
PID:292
-