Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 05:03
Static task
static1
Behavioral task
behavioral1
Sample
7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970.exe
-
Size
5.1MB
-
MD5
f3a3332b13baa50c41644b86efdf0fe4
-
SHA1
f3b91aa55b8dce62cb614e2a43d8e3973b1d47b6
-
SHA256
7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970
-
SHA512
46808e4d79d0d1fbe2835456daf31e0de9e8f296b7863f38400eaa03fbf33be450f92df16f9b77ac5bb95aa33a97d484c1c678891c6e13b151f9cb7865c99be7
-
SSDEEP
98304:EH//4Q0gBDcLaUgZLGTVCfjemnYMjgfRQ14dewsjdis7xGC4tIf/Yapu5koUe:0BD4aUgZLhj3gZj67xHRnFpu5kPe
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2636 7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970.exe 2636 7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\traveskoen.ini 7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2504 2636 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2504 2636 7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970.exe 30 PID 2636 wrote to memory of 2504 2636 7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970.exe 30 PID 2636 wrote to memory of 2504 2636 7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970.exe 30 PID 2636 wrote to memory of 2504 2636 7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970.exe"C:\Users\Admin\AppData\Local\Temp\7fd5435121f2cb4320b1bc49400152ec3fecce7f5ce0acce56f32c327126c970.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 282⤵
- Program crash
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52B
MD55d04a35d3950677049c7a0cf17e37125
SHA1cafdd49a953864f83d387774b39b2657a253470f
SHA256a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266
SHA512c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b
-
Filesize
56B
MD52b322a53d90a2271fff01bf0834a5fd9
SHA1da3fb0f558c75c2fe3d0bd7c9c19705b72b57d3d
SHA256c30c98b13bb40861ba5b1cd08cc1018d11c0e9b0c95716a8a0d7b8e0b863ceb9
SHA512f0b775fef5150a7824fe25320f0fb1c383bafc1af7ac79e2e3cc7e791d4f296c44755a5a56bd4dfeef8d0c9f913b5f9cf5b4ad8487fdc1163df82050ee64521b
-
Filesize
10B
MD59a53fc1d7126c5e7c81bb5c15b15537b
SHA1e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1
-
Filesize
15B
MD503789c00a9fe96c420d84fe30cbd902c
SHA1c3e589ccd78b4e000d7d294a0d308dfd385a1f43
SHA256b157a4d58f55726c15605ad776c9c961b28e1ce295d3ebcbad6ac80e5f2c9503
SHA51216b8866f73666e76b5fd8e04d362a9907accee835e2814197829a06b6f8442ca2ac6aef98960afcaedf64ad403e53374eb59746716dd5b4257d26d4ebfff72a6
-
Filesize
60B
MD557fcc15efb7333330e4ce43a197a823f
SHA166bd1a4b000cf26b6e568cacdda0e9f88c28f899
SHA25630a71bbb38285baea3079d8868ee88c97c988727e3a139528fc153291328e394
SHA512c1b9fda9ba474f6ff65a37656c8cddf072556a2eef653dd043fe1e3ae89e1ae8311aa0433bbb5c989912edbb21c85ed70f6866ab6957c83b88a085ccc4ae0316
-
Filesize
30B
MD5f15bfdebb2df02d02c8491bde1b4e9bd
SHA193bd46f57c3316c27cad2605ddf81d6c0bde9301
SHA256c87f2ff45bb530577fb8856df1760edaf1060ae4ee2934b17fdd21b7d116f043
SHA5121757ed4ae4d47d0c839511c18be5d75796224d4a3049e2d8853650ace2c5057c42040de6450bf90dd4969862e9ebb420cd8a34f8dd9c970779ed2e5459e8f2f1
-
Filesize
74B
MD516d513397f3c1f8334e8f3e4fc49828f
SHA14ee15afca81ca6a13af4e38240099b730d6931f0
SHA256d3c781a1855c8a70f5aca88d9e2c92afffa80541334731f62caa9494aa8a0c36
SHA5124a350b790fdd2fe957e9ab48d5969b217ab19fc7f93f3774f1121a5f140ff9a9eaaa8fa30e06a9ef40ad776e698c2e65a05323c3adf84271da1716e75f5183c3
-
Filesize
11KB
MD50063d48afe5a0cdc02833145667b6641
SHA1e7eb614805d183ecb1127c62decb1a6be1b4f7a8
SHA256ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7
SHA51271cbbcaeb345e09306e368717ea0503fe8df485be2e95200febc61bcd8ba74fb4211cd263c232f148c0123f6c6f2e3fd4ea20bdecc4070f5208c35c6920240f0