Analysis
-
max time kernel
100s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 18:17
Static task
static1
Behavioral task
behavioral1
Sample
4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6bN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6bN.exe
Resource
win10v2004-20241007-en
General
-
Target
4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6bN.exe
-
Size
1.6MB
-
MD5
af97becfff5eade18ac1707748ff62f0
-
SHA1
8d39abbca12f5bcc990ff77bbdfe03d9ad983c5a
-
SHA256
4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6b
-
SHA512
8746888c388f6e0bacbd8cb91608d3c3463ddd87090e560ccb1ae835edc35b1c08aef493eece011542533661aafa6230eb4bf6888e0aed2e1b8f910495fa932b
-
SSDEEP
12288:Zso749bLRwOIUZoID/jlDa/ZSaniF+G4mjUmTrVB6dMU:apq8oIBa/ZSaniF+ujZXIMU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3476 4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6bN.exe -
Executes dropped EXE 1 IoCs
pid Process 3476 4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6bN.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 1648 4876 WerFault.exe 82 1912 3476 WerFault.exe 90 1816 3476 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6bN.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4876 4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6bN.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3476 4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6bN.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4876 wrote to memory of 3476 4876 4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6bN.exe 90 PID 4876 wrote to memory of 3476 4876 4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6bN.exe 90 PID 4876 wrote to memory of 3476 4876 4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6bN.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6bN.exe"C:\Users\Admin\AppData\Local\Temp\4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6bN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 3522⤵
- Program crash
PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6bN.exeC:\Users\Admin\AppData\Local\Temp\4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6bN.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 3483⤵
- Program crash
PID:1912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 3723⤵
- Program crash
PID:1816
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 4876 -ip 48761⤵PID:4320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3476 -ip 34761⤵PID:3452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3476 -ip 34761⤵PID:2072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4819cbc0709703e0c628ef3b65b0af5a93e31fc5d6f4ab9231fcf776f3091e6bN.exe
Filesize1.6MB
MD54f39adf1f1a605aa2e6156111cbe1e73
SHA180168cf843442d45e51988f2671f7e084eacfde3
SHA25668b33565365b2bed0ac01238678a441f4ea8565a4f56b15d37fdf07a6aa272c0
SHA512d42fd59cd216e42bee45fe534e64e91057db62f3f9ed9679f117aa3c55b622c87782d1e9ae34471325e73117b0423bf9d514f0a859e87aa71f2b810cd9e1dc56