Analysis
-
max time kernel
95s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 17:41
Static task
static1
Behavioral task
behavioral1
Sample
4e942a35e8d3cdf4a8b994d786253b7c7a07935a4b223810df7d8f5b7498b967N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4e942a35e8d3cdf4a8b994d786253b7c7a07935a4b223810df7d8f5b7498b967N.exe
Resource
win10v2004-20241007-en
General
-
Target
4e942a35e8d3cdf4a8b994d786253b7c7a07935a4b223810df7d8f5b7498b967N.exe
-
Size
53KB
-
MD5
d143563c67f317a531147d6a9ee83000
-
SHA1
4b9e2542d023da1cbd0523f5695086f11318bafb
-
SHA256
4e942a35e8d3cdf4a8b994d786253b7c7a07935a4b223810df7d8f5b7498b967
-
SHA512
02c9d2b6804e5c998533cd7608ac860209150a35a13726dfc249b342892333eeadfee271c8fb8598c3d3ea369f34e3a4dc32c9a741f27620fd38a282607c4c4a
-
SSDEEP
1536:dNGg8r8Qpdbt7sX8q7Kp3StjEMjmLM3ztDJWZsXy4JzxPM0:8t7sXnJJjmLM3zRJWZsXy4Jd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 4e942a35e8d3cdf4a8b994d786253b7c7a07935a4b223810df7d8f5b7498b967N.exe -
Executes dropped EXE 1 IoCs
pid Process 3860 heudu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3328 2036 WerFault.exe 81 2696 3860 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e942a35e8d3cdf4a8b994d786253b7c7a07935a4b223810df7d8f5b7498b967N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language heudu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2036 4e942a35e8d3cdf4a8b994d786253b7c7a07935a4b223810df7d8f5b7498b967N.exe 3860 heudu.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2036 wrote to memory of 3860 2036 4e942a35e8d3cdf4a8b994d786253b7c7a07935a4b223810df7d8f5b7498b967N.exe 85 PID 2036 wrote to memory of 3860 2036 4e942a35e8d3cdf4a8b994d786253b7c7a07935a4b223810df7d8f5b7498b967N.exe 85 PID 2036 wrote to memory of 3860 2036 4e942a35e8d3cdf4a8b994d786253b7c7a07935a4b223810df7d8f5b7498b967N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e942a35e8d3cdf4a8b994d786253b7c7a07935a4b223810df7d8f5b7498b967N.exe"C:\Users\Admin\AppData\Local\Temp\4e942a35e8d3cdf4a8b994d786253b7c7a07935a4b223810df7d8f5b7498b967N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\heudu.exe"C:\Users\Admin\heudu.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 6723⤵
- Program crash
PID:2696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 9882⤵
- Program crash
PID:3328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2036 -ip 20361⤵PID:3944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3860 -ip 38601⤵PID:3420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5ee0f55457c2344bc994d451d582f4c7b
SHA1e5a977d11d3dd528e493414dbc50d2118623a982
SHA256531198574a45d45fa6f793fe6575c5b10f44379c59927814e45eef3a9125c08a
SHA5121db0d326b2365b936b596fee0a32ada244bc94160d2115123fd443b1417ee73b6cf1ec599acbead1f80bc914c7859358340af34ddde0f7b0e07fd05e230842f6