Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 17:16
Static task
static1
Behavioral task
behavioral1
Sample
ActSet.exe
Resource
win7-20240903-en
General
-
Target
ActSet.exe
-
Size
650.0MB
-
MD5
5d154e54427fc951508fcb8225260eeb
-
SHA1
02ef7db12f07ac919823a765c35bef0a0ac777cb
-
SHA256
62c435de1dd3657a0d2203948aa79de68432ee59b632574f571211acf3520b37
-
SHA512
211a11b84aa9e64e3ea25782c4b4eb0ce48842b98262c03be1b2de705386e04e02b49ba61680e624a0216cd863cef48f3793c301825f29cb9260eeafb454ed87
-
SSDEEP
49152:CeNzxKvAI/KnCAjFN2DOjwJHJdVLD4+04p+cn0Jmc9gqSsOp4MQ+FnFrMR5:DCA34pfBGgqSsOV
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ActSet.exedescription ioc process File opened (read-only) \??\D: ActSet.exe File opened (read-only) \??\F: ActSet.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2072 2120 WerFault.exe ActSet.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ActSet.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ActSet.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
ActSet.exedescription pid process target process PID 2120 wrote to memory of 2072 2120 ActSet.exe WerFault.exe PID 2120 wrote to memory of 2072 2120 ActSet.exe WerFault.exe PID 2120 wrote to memory of 2072 2120 ActSet.exe WerFault.exe PID 2120 wrote to memory of 2072 2120 ActSet.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ActSet.exe"C:\Users\Admin\AppData\Local\Temp\ActSet.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 2962⤵
- Program crash
PID:2072