Overview
overview
10Static
static
513f8bb1af7...be.exe
windows7-x64
1049b84085b7...c6.exe
windows7-x64
10639a86559b...3d.exe
windows7-x64
10c0cf40b883...3a.exe
windows7-x64
8e49778d20a...73.exe
windows7-x64
8inquiry.scr
windows7-x64
9Накла...15.scr
windows7-x64
3ПРЕТЕ...Я.scr
windows7-x64
5Счет �...08.scr
windows7-x64
3карто...я.scr
windows7-x64
5Analysis
-
max time kernel
1443s -
max time network
1451s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 20:53
Behavioral task
behavioral1
Sample
13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
c0cf40b8830d666a24bdd4febdc162e95aa30ed968fa3675e26ad97b2e88e03a.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
e49778d20a2f9b1f8b00ddd24b6bcee81af381ed02cfe0a3c9ab3111cda5f573.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
inquiry.scr
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
Накладная для 1736 от 26.08.2015.scr
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
ПРЕТЕНЗИЯ.scr
Resource
win7-20241010-en
Behavioral task
behavioral9
Sample
Счет на оплату от 26-08.scr
Resource
win7-20240903-en
General
-
Target
ПРЕТЕНЗИЯ.scr
-
Size
231KB
-
MD5
6c01e0f297debe4606cf2cab510c38ab
-
SHA1
cea2a8e2f75a027fbbcada3aae952247009cdfbc
-
SHA256
d228eaf1e691f993be276129421583737f85185eb8f04695db7707dc3ac175fb
-
SHA512
c56ec26ccde738aef65d35e8adbb5f871194716f23b90532d9ec397f2ea2788b8b186eb2787e166eb2e898a579081525a0ea806dbb1cb0b3ee7e49af7ad97b50
-
SSDEEP
6144:THJih6+NSgZ7OT1Oq1qbS1x9pAxEP3vgBHK:TpWRZ7OJODuq6/
Malware Config
Signatures
-
resource yara_rule behavioral8/memory/1820-0-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral8/memory/1820-2-0x0000000000400000-0x0000000000473000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3008 1820 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ПРЕТЕНЗИЯ.scr -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1820 ПРЕТЕНЗИЯ.scr -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 3008 1820 ПРЕТЕНЗИЯ.scr 29 PID 1820 wrote to memory of 3008 1820 ПРЕТЕНЗИЯ.scr 29 PID 1820 wrote to memory of 3008 1820 ПРЕТЕНЗИЯ.scr 29 PID 1820 wrote to memory of 3008 1820 ПРЕТЕНЗИЯ.scr 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ПРЕТЕНЗИЯ.scr"C:\Users\Admin\AppData\Local\Temp\ПРЕТЕНЗИЯ.scr" /S1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 1002⤵
- Program crash
PID:3008
-