Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2024, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
Plaćanje30102024,jpg.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Plaćanje30102024,jpg.exe
Resource
win10v2004-20241007-en
General
-
Target
Plaćanje30102024,jpg.exe
-
Size
1.1MB
-
MD5
465bd70c325f9222675b270dafd90fcc
-
SHA1
e9a7353cd7bc7a819b69ca0660b44ee246befeab
-
SHA256
f2dd373bd505a2ee1d02404abfba280aa2e34085a7ab52c45225819a156ba2de
-
SHA512
85f80177e9bd9141d93ca62d7a636219239c99446e08174d3b66a1f4603ab9eec22634528bec87d72e5bfec6e28d9b91ba070f6994a70359a39d475251972ecb
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLHo56DAfC40g2/OqT8CVS:f3v+7/5QLHFAsu5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1668 4468 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Plaćanje30102024,jpg.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe 4468 Plaćanje30102024,jpg.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4468 wrote to memory of 2444 4468 Plaćanje30102024,jpg.exe 94 PID 4468 wrote to memory of 2444 4468 Plaćanje30102024,jpg.exe 94 PID 4468 wrote to memory of 2444 4468 Plaćanje30102024,jpg.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Plaćanje30102024,jpg.exe"C:\Users\Admin\AppData\Local\Temp\Plaćanje30102024,jpg.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Plaćanje30102024,jpg.exe"2⤵PID:2444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 7522⤵
- Program crash
PID:1668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4468 -ip 44681⤵PID:376