Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-10-2024 06:00
Static task
static1
Behavioral task
behavioral1
Sample
ME77ZTVpfPe1.exe
Resource
win7-20241010-en
General
-
Target
ME77ZTVpfPe1.exe
-
Size
360KB
-
MD5
a0a4c2e4123c895b019404faac31eea5
-
SHA1
18254b9eda5a7d1bb9505cc46b992709029091c8
-
SHA256
1c74716aa959672f89ca6a090cf8aee85eee235980f00cf4a1f049b265b4a836
-
SHA512
3b6f9347cfd753607014147dddd1a60f87a8580f84caba99b72b8b319d1e7b8a52bad76a5d81653fabb083c4a037ed28e4cd4178aecde3a19b1ef419b853709c
-
SSDEEP
6144:KIrgO6OmMo/f7DGUOodFeq4cH0RfWLN0SMJWW6vtuwFi0QRjZj:F8XGPoDeqnUR+N3fVVxM0QRjZj
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 3064 1728 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ME77ZTVpfPe1.exepowershell.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ME77ZTVpfPe1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid Process 2268 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeME77ZTVpfPe1.exedescription pid Process Token: SeDebugPrivilege 2268 powershell.exe Token: SeDebugPrivilege 1728 ME77ZTVpfPe1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ME77ZTVpfPe1.exedescription pid Process procid_target PID 1728 wrote to memory of 2268 1728 ME77ZTVpfPe1.exe 31 PID 1728 wrote to memory of 2268 1728 ME77ZTVpfPe1.exe 31 PID 1728 wrote to memory of 2268 1728 ME77ZTVpfPe1.exe 31 PID 1728 wrote to memory of 2268 1728 ME77ZTVpfPe1.exe 31 PID 1728 wrote to memory of 3064 1728 ME77ZTVpfPe1.exe 33 PID 1728 wrote to memory of 3064 1728 ME77ZTVpfPe1.exe 33 PID 1728 wrote to memory of 3064 1728 ME77ZTVpfPe1.exe 33 PID 1728 wrote to memory of 3064 1728 ME77ZTVpfPe1.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ME77ZTVpfPe1.exe"C:\Users\Admin\AppData\Local\Temp\ME77ZTVpfPe1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionExtension '.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 12642⤵
- Program crash
PID:3064
-