Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 14:44
Static task
static1
Behavioral task
behavioral1
Sample
500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe
Resource
win10v2004-20241007-en
General
-
Target
500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe
-
Size
1.8MB
-
MD5
337e300721c80ee6c114cc38b2ed786a
-
SHA1
c6403b50de536acd4b7b90a4173ebe86bb86a001
-
SHA256
500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb
-
SHA512
bdec678edfcdd29d0c8fb585cedd628ee6629410e79cfae3f8747066f9264c2f4ad92a35a31df4a48ab8e4682b47aca49fbff3ce22c9e80f6ccad5796f6530b4
-
SSDEEP
24576:DTEk3Xn9SWNNjE6zdAiYVs6hkBWa514UeWgzSULrGlK3Tacr+bZ47x:3nN4AAU6AoPQULrGlK3TcZ47
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reun.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reun.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2852 3200 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 3200 wrote to memory of 3432 3200 500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe"C:\Users\Admin\AppData\Local\Temp\500670f00b1e99426a3f5a49634475b69e3bca76442f7ad6db3b082fd094aecb.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 11163⤵
- Program crash
PID:2852
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3200 -ip 32001⤵PID:1328