Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 23:16

General

  • Target

    6e20f9687cd7e6e2e7cc956a4f834e079b9cfb53d7db3776f99b0fd4b3fcb196.exe

  • Size

    272KB

  • MD5

    0dafdcef4ed05d008c7fde7bc21daf75

  • SHA1

    18ae591bd31256514b073a22be27c91d0532547b

  • SHA256

    6e20f9687cd7e6e2e7cc956a4f834e079b9cfb53d7db3776f99b0fd4b3fcb196

  • SHA512

    01cf7cedd294e605bc687947f9aea1335addf5593c055d1ee82a7f754fce7280848d5de0862fdde226f6fa83e605571d12686d47bd7fa89c68bcb753f5f6f60a

  • SSDEEP

    3072:YNZEITsAQlhWCcC6uYnF9uAzX/0faAbPy8psrs1BN2JZBS7BtRJQZfwM+ZgAqrPW:0bsAKDSruAj0fasyM34BSvG+Zgfb2CE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e20f9687cd7e6e2e7cc956a4f834e079b9cfb53d7db3776f99b0fd4b3fcb196.exe
    "C:\Users\Admin\AppData\Local\Temp\6e20f9687cd7e6e2e7cc956a4f834e079b9cfb53d7db3776f99b0fd4b3fcb196.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Users\Admin\AppData\Local\Temp\6e20f9687cd7e6e2e7cc956a4f834e079b9cfb53d7db3776f99b0fd4b3fcb196mgr.exe
      C:\Users\Admin\AppData\Local\Temp\6e20f9687cd7e6e2e7cc956a4f834e079b9cfb53d7db3776f99b0fd4b3fcb196mgr.exe
      2⤵
      • Executes dropped EXE
      PID:512
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 512 -s 264
        3⤵
        • Program crash
        PID:3164
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 512 -ip 512
    1⤵
      PID:4428

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\6e20f9687cd7e6e2e7cc956a4f834e079b9cfb53d7db3776f99b0fd4b3fcb196mgr.exe

            Filesize

            67KB

            MD5

            ba4610e9ca3ebf61ec5800955a797c13

            SHA1

            66fd641b894b56c212275eb62a45b667e6f0f78b

            SHA256

            6eb6cb7e312086b243a1606c4df19a98e1711f3de8fe96866abbd95ba0b51ff8

            SHA512

            cf832767a0dbf8468623b840baa578448174eff472653080d2f2123f2e514ab454e9ddabc98c827a4469760f4f22ed2ffcba71368fb11779aea2d72545776c26

          • memory/512-6-0x00000000004D0000-0x00000000004D1000-memory.dmp

            Filesize

            4KB

          • memory/512-5-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/512-8-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/4480-0-0x0000000000400000-0x0000000000448000-memory.dmp

            Filesize

            288KB

          • memory/4480-9-0x0000000000400000-0x0000000000448000-memory.dmp

            Filesize

            288KB