Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 15:44
Static task
static1
Behavioral task
behavioral1
Sample
4aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285.exe
Resource
win10v2004-20241007-en
General
-
Target
4aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285.exe
-
Size
2.9MB
-
MD5
155573c10ba4dfaa5e03edbc0ec1693e
-
SHA1
69e2079d8d1b6b3b63054ddcb230ed1692215937
-
SHA256
4aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285
-
SHA512
4e82365c54a897d60ecf2fc1d48d71c6f2349750558370f7165308afa6a3e429f164455234334eacfe293ed82f6c7f745fa5bb58a2c4e2000a496a547861f676
-
SSDEEP
49152:7JZoQrbTFZY1iaC/xLjwrTEWcVtb/vSNTOHGtLUYTwZwcgRLKLCdjrnSYCFyg8qs:7trbTA1ejwrItTvSNTOmtLtw4RL1rnnd
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 764 name.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023c80-5.dat autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4564 764 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2240 4aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285.exe 2240 4aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285.exe 764 name.exe 764 name.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2240 4aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285.exe 2240 4aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285.exe 764 name.exe 764 name.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2240 wrote to memory of 764 2240 4aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285.exe 86 PID 2240 wrote to memory of 764 2240 4aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285.exe 86 PID 2240 wrote to memory of 764 2240 4aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285.exe 86 PID 764 wrote to memory of 2484 764 name.exe 87 PID 764 wrote to memory of 2484 764 name.exe 87 PID 764 wrote to memory of 2484 764 name.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285.exe"C:\Users\Admin\AppData\Local\Temp\4aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\4aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\4aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285.exe"3⤵PID:2484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 7523⤵
- Program crash
PID:4564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 764 -ip 7641⤵PID:2848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5155573c10ba4dfaa5e03edbc0ec1693e
SHA169e2079d8d1b6b3b63054ddcb230ed1692215937
SHA2564aa2ea3cc55b48f3f6e54c75d383592a6fd4fa449908adbc019c3fb676dd5285
SHA5124e82365c54a897d60ecf2fc1d48d71c6f2349750558370f7165308afa6a3e429f164455234334eacfe293ed82f6c7f745fa5bb58a2c4e2000a496a547861f676