Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 03:24
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_PO-20240320_HYU SO#224934972_10-14-2024_Order.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ_PO-20240320_HYU SO#224934972_10-14-2024_Order.exe
Resource
win10v2004-20241007-en
General
-
Target
RFQ_PO-20240320_HYU SO#224934972_10-14-2024_Order.exe
-
Size
3.1MB
-
MD5
29efaa947827fdf7c2e073d722e2e9ed
-
SHA1
63fdea3a572f3da72828a8b9c24b7597e191c38e
-
SHA256
0b0e015a5d60e901e68488e46635be7b45c34d80314cc95c71f45985b5fb1e1c
-
SHA512
435f53792bd4541f39f9ed62fa7438231bf2c3420e6c12f8589c110ae22ad7ced6cb253ff7cb31caa2f838c65bc5c188b72321b0b4a03452a539cb25544c2aef
-
SSDEEP
49152:t3v+7/5QgVx5vEjriM0lOqjAyWUlHj8TwyBOBSYF7C4fCQrIHZM5oITGMdnWcG:t3v+7Zv+mFjAGiTBBTYF7MQrIHMHdWcG
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\harrowment.vbs harrowment.exe -
Executes dropped EXE 1 IoCs
pid Process 1588 harrowment.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000b000000023b74-5.dat autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1780 1588 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ_PO-20240320_HYU SO#224934972_10-14-2024_Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language harrowment.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4300 wrote to memory of 1588 4300 RFQ_PO-20240320_HYU SO#224934972_10-14-2024_Order.exe 86 PID 4300 wrote to memory of 1588 4300 RFQ_PO-20240320_HYU SO#224934972_10-14-2024_Order.exe 86 PID 4300 wrote to memory of 1588 4300 RFQ_PO-20240320_HYU SO#224934972_10-14-2024_Order.exe 86 PID 1588 wrote to memory of 3648 1588 harrowment.exe 87 PID 1588 wrote to memory of 3648 1588 harrowment.exe 87 PID 1588 wrote to memory of 3648 1588 harrowment.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ_PO-20240320_HYU SO#224934972_10-14-2024_Order.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_PO-20240320_HYU SO#224934972_10-14-2024_Order.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\ghauts\harrowment.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_PO-20240320_HYU SO#224934972_10-14-2024_Order.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_PO-20240320_HYU SO#224934972_10-14-2024_Order.exe"3⤵PID:3648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 7403⤵
- Program crash
PID:1780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1588 -ip 15881⤵PID:1968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD529efaa947827fdf7c2e073d722e2e9ed
SHA163fdea3a572f3da72828a8b9c24b7597e191c38e
SHA2560b0e015a5d60e901e68488e46635be7b45c34d80314cc95c71f45985b5fb1e1c
SHA512435f53792bd4541f39f9ed62fa7438231bf2c3420e6c12f8589c110ae22ad7ced6cb253ff7cb31caa2f838c65bc5c188b72321b0b4a03452a539cb25544c2aef