Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
a3a878b38b2c296dc2e0cba3f683e936e86dfd87d826366a452004c82501eda7N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a3a878b38b2c296dc2e0cba3f683e936e86dfd87d826366a452004c82501eda7N.exe
Resource
win10v2004-20240802-en
General
-
Target
a3a878b38b2c296dc2e0cba3f683e936e86dfd87d826366a452004c82501eda7N.exe
-
Size
3.2MB
-
MD5
f8ee9680ec8b56cf0a5a4df7bf9ec720
-
SHA1
10528c799f16d6ed264003a93b9ff57a95b5497d
-
SHA256
a3a878b38b2c296dc2e0cba3f683e936e86dfd87d826366a452004c82501eda7
-
SHA512
77a7fcead5f5d045bdba25155f12668bbdd0002a4716e2ba42927205f02aebe12a83644d786b1f826b843c4a62e6a900393a2bab113b2fb30416de2a872f1f22
-
SSDEEP
49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1Ny:DBIKRAGRe5K2UZu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2196 f76695d.exe -
Loads dropped DLL 9 IoCs
pid Process 2820 a3a878b38b2c296dc2e0cba3f683e936e86dfd87d826366a452004c82501eda7N.exe 2820 a3a878b38b2c296dc2e0cba3f683e936e86dfd87d826366a452004c82501eda7N.exe 596 WerFault.exe 596 WerFault.exe 596 WerFault.exe 596 WerFault.exe 596 WerFault.exe 596 WerFault.exe 596 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 596 2196 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3a878b38b2c296dc2e0cba3f683e936e86dfd87d826366a452004c82501eda7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76695d.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2820 a3a878b38b2c296dc2e0cba3f683e936e86dfd87d826366a452004c82501eda7N.exe 2820 a3a878b38b2c296dc2e0cba3f683e936e86dfd87d826366a452004c82501eda7N.exe 2196 f76695d.exe 2196 f76695d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2196 2820 a3a878b38b2c296dc2e0cba3f683e936e86dfd87d826366a452004c82501eda7N.exe 30 PID 2820 wrote to memory of 2196 2820 a3a878b38b2c296dc2e0cba3f683e936e86dfd87d826366a452004c82501eda7N.exe 30 PID 2820 wrote to memory of 2196 2820 a3a878b38b2c296dc2e0cba3f683e936e86dfd87d826366a452004c82501eda7N.exe 30 PID 2820 wrote to memory of 2196 2820 a3a878b38b2c296dc2e0cba3f683e936e86dfd87d826366a452004c82501eda7N.exe 30 PID 2196 wrote to memory of 596 2196 f76695d.exe 32 PID 2196 wrote to memory of 596 2196 f76695d.exe 32 PID 2196 wrote to memory of 596 2196 f76695d.exe 32 PID 2196 wrote to memory of 596 2196 f76695d.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3a878b38b2c296dc2e0cba3f683e936e86dfd87d826366a452004c82501eda7N.exe"C:\Users\Admin\AppData\Local\Temp\a3a878b38b2c296dc2e0cba3f683e936e86dfd87d826366a452004c82501eda7N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76695d.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f76695d.exe 2594184772⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 6003⤵
- Loads dropped DLL
- Program crash
PID:596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5ed367d38836f6d7ffd0307eb90751102
SHA1e019a4b040eeac721ae84cfdcf1963839ec5c80b
SHA2568b74b159093c9e900715a9c01e704a2bade133f67ddf3d6ff3ba044eaf750afa
SHA5126a4db8f74ab1a32ba9c8b96178ae3e938a5a6b70db71761e1aeedbb541ce41d1b1a9afe717dfe294789462b342025e9d1613112f3cd1225f210b1ae6ae580db8