Overview
overview
10Static
static
50442cfabb3...ab.exe
windows7-x64
8c0cf40b883...3a.exe
windows7-x64
8cry1.exe
windows7-x64
8cry2.exe
windows7-x64
8cry3.exe
windows7-x64
10cry4.exe
windows7-x64
10cry5.exe
windows7-x64
8cry6.exe
windows7-x64
10e49778d20a...73.exe
windows7-x64
8inquiry.scr
windows7-x64
9Накла...15.scr
windows7-x64
3ПРЕТЕ...Я.scr
windows7-x64
5Счет �...08.scr
windows7-x64
3карто...я.scr
windows7-x64
5Analysis
-
max time kernel
359s -
max time network
360s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 11:10
Behavioral task
behavioral1
Sample
0442cfabb3212644c4b894a7e4a7e84c00fd23489cc4f96490f9988e6074b6ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c0cf40b8830d666a24bdd4febdc162e95aa30ed968fa3675e26ad97b2e88e03a.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
cry1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
cry2.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
cry3.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
cry4.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
cry5.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
cry6.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
e49778d20a2f9b1f8b00ddd24b6bcee81af381ed02cfe0a3c9ab3111cda5f573.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
inquiry.scr
Resource
win7-20241010-en
Behavioral task
behavioral11
Sample
Накладная для 1736 от 26.08.2015.scr
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
ПРЕТЕНЗИЯ.scr
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
Счет на оплату от 26-08.scr
Resource
win7-20240708-en
General
-
Target
карточка предприятия.scr
-
Size
185KB
-
MD5
f1b11de8044720671240999846fe5e69
-
SHA1
03ae6c1090cd6392365fe9d4cfc061bb626688ad
-
SHA256
37f6ccf41a6f66008651c0d272090da64b3b28f6970a9404cb5ecf886ea776b1
-
SHA512
8c4bd6b406a1e2edf3f6bb9bb6b3debae4b6b312e474b4a9bedb93b097a45d193a4a3d6a0119e2ade467ced262ef9941e4c578720d227b9be58a8cdb44074894
-
SSDEEP
3072:R/JLIuc9pgKqUsZ+tKbewtr2ab+/MThp5rTTiLIQ1mKCRhgvpIXljSQ1ZdBc:R/JFutWDWabJ1PrTeLD1FyhgvpIXlV1P
Malware Config
Signatures
-
resource yara_rule behavioral14/memory/1036-0-0x0000000000D40000-0x0000000000DF4000-memory.dmp upx behavioral14/memory/1036-1-0x0000000000D40000-0x0000000000DF4000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2684 1036 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language карточка предприятия.scr -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1036 карточка предприятия.scr -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1036 wrote to memory of 2684 1036 карточка предприятия.scr 31 PID 1036 wrote to memory of 2684 1036 карточка предприятия.scr 31 PID 1036 wrote to memory of 2684 1036 карточка предприятия.scr 31 PID 1036 wrote to memory of 2684 1036 карточка предприятия.scr 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\карточка предприятия.scr"C:\Users\Admin\AppData\Local\Temp\карточка предприятия.scr" /S1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 1002⤵
- Program crash
PID:2684
-