Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 11:07
Static task
static1
Behavioral task
behavioral1
Sample
PO for October.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PO for October.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
PO for October.exe
-
Size
505KB
-
MD5
bf850cd7bd7cdfc2b21420ae5911fbaf
-
SHA1
9b67f9d3e9319f9abd19686411884c441051e568
-
SHA256
9576f740ace3c18ef6ab226e8c6ec41597af4d6b96ee8bc50861420cd7385193
-
SHA512
02862973206b7a5c25d63a6b4f4f558a242ae8b7cbe698f1208d2cd2b048d1bd843b32b7b1823607134271e4d34128b04a114a80b481be2783af888dab7ae0fb
-
SSDEEP
12288:ehSF4nneptwUHCQ9BelL91hiV0kqLFk0hyS2BjXGRKki7kQfwf1mWZxmDBVMayaE:ehvgdES41Lx4BSBnHt
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1820 PO for October.exe 1820 PO for October.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2260 1820 WerFault.exe 27 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO for October.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2260 1820 PO for October.exe 28 PID 1820 wrote to memory of 2260 1820 PO for October.exe 28 PID 1820 wrote to memory of 2260 1820 PO for October.exe 28 PID 1820 wrote to memory of 2260 1820 PO for October.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO for October.exe"C:\Users\Admin\AppData\Local\Temp\PO for October.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 5242⤵
- Program crash
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5dd87a973e01c5d9f8e0fcc81a0af7c7a
SHA1c9206ced48d1e5bc648b1d0f54cccc18bf643a14
SHA2567fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1
SHA5124910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f