Analysis
-
max time kernel
111s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 17:56
Static task
static1
Behavioral task
behavioral1
Sample
4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe
Resource
win7-20241010-en
General
-
Target
4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe
-
Size
800KB
-
MD5
1fbafb7caa3240455eaf42ee4fe053d0
-
SHA1
2cc567399d0161bbd0783b2b597bb46bab49afdd
-
SHA256
4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61
-
SHA512
0b622400bcfe9617c1f900e119d499f1b86d6aecf856891e6c15b353e53b58c475df219c0ce887c588ea82404b53606d160dcb6942c613b426c271f49f497dad
-
SSDEEP
3072:lv6v8yo7nPcvE8LroAI1wMF78oXupTAVjN:lvJyo7PcvHoHuuBXKUp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe -
Executes dropped EXE 6 IoCs
pid Process 1668 winlogon.exe 2592 winlogon.exe 3156 winlogon.exe 4984 winlogon.exe 1832 winlogon.exe 4100 winlogon.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1344 set thread context of 3180 1344 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe 84 PID 1668 set thread context of 2592 1668 winlogon.exe 90 PID 2592 set thread context of 3156 2592 winlogon.exe 92 PID 2592 set thread context of 4984 2592 winlogon.exe 100 PID 2592 set thread context of 1832 2592 winlogon.exe 105 PID 2592 set thread context of 4100 2592 winlogon.exe 108 -
resource yara_rule behavioral2/memory/3180-0-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/3180-3-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/3180-5-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/2592-23-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/2592-22-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/3180-18-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/2592-27-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/2592-30-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/2592-36-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/2592-41-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/2592-47-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 984 3156 WerFault.exe 92 2644 4984 WerFault.exe 100 632 1832 WerFault.exe 105 4292 4100 WerFault.exe 108 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3180 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe 2592 winlogon.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 1344 wrote to memory of 2304 1344 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe 83 PID 1344 wrote to memory of 2304 1344 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe 83 PID 1344 wrote to memory of 2304 1344 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe 83 PID 1344 wrote to memory of 3180 1344 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe 84 PID 1344 wrote to memory of 3180 1344 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe 84 PID 1344 wrote to memory of 3180 1344 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe 84 PID 1344 wrote to memory of 3180 1344 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe 84 PID 1344 wrote to memory of 3180 1344 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe 84 PID 1344 wrote to memory of 3180 1344 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe 84 PID 1344 wrote to memory of 3180 1344 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe 84 PID 1344 wrote to memory of 3180 1344 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe 84 PID 3180 wrote to memory of 1668 3180 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe 88 PID 3180 wrote to memory of 1668 3180 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe 88 PID 3180 wrote to memory of 1668 3180 4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe 88 PID 1668 wrote to memory of 1292 1668 winlogon.exe 89 PID 1668 wrote to memory of 1292 1668 winlogon.exe 89 PID 1668 wrote to memory of 1292 1668 winlogon.exe 89 PID 1668 wrote to memory of 2592 1668 winlogon.exe 90 PID 1668 wrote to memory of 2592 1668 winlogon.exe 90 PID 1668 wrote to memory of 2592 1668 winlogon.exe 90 PID 1668 wrote to memory of 2592 1668 winlogon.exe 90 PID 1668 wrote to memory of 2592 1668 winlogon.exe 90 PID 1668 wrote to memory of 2592 1668 winlogon.exe 90 PID 1668 wrote to memory of 2592 1668 winlogon.exe 90 PID 1668 wrote to memory of 2592 1668 winlogon.exe 90 PID 2592 wrote to memory of 3156 2592 winlogon.exe 92 PID 2592 wrote to memory of 3156 2592 winlogon.exe 92 PID 2592 wrote to memory of 3156 2592 winlogon.exe 92 PID 2592 wrote to memory of 3156 2592 winlogon.exe 92 PID 2592 wrote to memory of 3156 2592 winlogon.exe 92 PID 2592 wrote to memory of 3156 2592 winlogon.exe 92 PID 2592 wrote to memory of 3156 2592 winlogon.exe 92 PID 2592 wrote to memory of 3156 2592 winlogon.exe 92 PID 2592 wrote to memory of 4984 2592 winlogon.exe 100 PID 2592 wrote to memory of 4984 2592 winlogon.exe 100 PID 2592 wrote to memory of 4984 2592 winlogon.exe 100 PID 2592 wrote to memory of 4984 2592 winlogon.exe 100 PID 2592 wrote to memory of 4984 2592 winlogon.exe 100 PID 2592 wrote to memory of 4984 2592 winlogon.exe 100 PID 2592 wrote to memory of 4984 2592 winlogon.exe 100 PID 2592 wrote to memory of 4984 2592 winlogon.exe 100 PID 2592 wrote to memory of 1832 2592 winlogon.exe 105 PID 2592 wrote to memory of 1832 2592 winlogon.exe 105 PID 2592 wrote to memory of 1832 2592 winlogon.exe 105 PID 2592 wrote to memory of 1832 2592 winlogon.exe 105 PID 2592 wrote to memory of 1832 2592 winlogon.exe 105 PID 2592 wrote to memory of 1832 2592 winlogon.exe 105 PID 2592 wrote to memory of 1832 2592 winlogon.exe 105 PID 2592 wrote to memory of 1832 2592 winlogon.exe 105 PID 2592 wrote to memory of 4100 2592 winlogon.exe 108 PID 2592 wrote to memory of 4100 2592 winlogon.exe 108 PID 2592 wrote to memory of 4100 2592 winlogon.exe 108 PID 2592 wrote to memory of 4100 2592 winlogon.exe 108 PID 2592 wrote to memory of 4100 2592 winlogon.exe 108 PID 2592 wrote to memory of 4100 2592 winlogon.exe 108 PID 2592 wrote to memory of 4100 2592 winlogon.exe 108 PID 2592 wrote to memory of 4100 2592 winlogon.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe"C:\Users\Admin\AppData\Local\Temp\4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\4ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61N.exe
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:1292
-
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:3156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 126⤵
- Program crash
PID:984
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:4984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 126⤵
- Program crash
PID:2644
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:1832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 126⤵
- Program crash
PID:632
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:4100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 126⤵
- Program crash
PID:4292
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3156 -ip 31561⤵PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4984 -ip 49841⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1832 -ip 18321⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4100 -ip 41001⤵PID:4176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
800KB
MD51fbafb7caa3240455eaf42ee4fe053d0
SHA12cc567399d0161bbd0783b2b597bb46bab49afdd
SHA2564ddc489c26a2319bf4f6421c6e0ab1f211037dfcc6e345145431b6139c7b0f61
SHA5120b622400bcfe9617c1f900e119d499f1b86d6aecf856891e6c15b353e53b58c475df219c0ce887c588ea82404b53606d160dcb6942c613b426c271f49f497dad