Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2024, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe
Resource
win10v2004-20241007-en
General
-
Target
edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe
-
Size
1.3MB
-
MD5
6dddf5c4823bc73c25d04605626fbad0
-
SHA1
c1a6bad0bd35de4ccaf70337ea697e92f9ff8fa2
-
SHA256
edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11
-
SHA512
1939d94219c8782d5269159050f18e151da07ff6a4d84c2463c015b731e680b501209f40cab48cc7d56940a1c23ad7ab6fb0032e475a37ff42efd3e6c3f5968f
-
SSDEEP
24576:+qDEvCTbMWu7rQYlBQcBiT6rprG8asH1I5+5QkhOH1o81c5rjD:+TvC/MTQYxsWR7asVI5++kIqku
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dews.vbs dews.exe -
Executes dropped EXE 1 IoCs
pid Process 1996 dews.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000b000000023b86-5.dat autoit_exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2248 1996 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dews.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 1996 dews.exe 1996 dews.exe 1996 dews.exe 1996 dews.exe 1996 dews.exe 1996 dews.exe 1996 dews.exe 1996 dews.exe 1996 dews.exe 1996 dews.exe -
Suspicious use of SendNotifyMessage 21 IoCs
pid Process 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 1996 dews.exe 1996 dews.exe 1996 dews.exe 1996 dews.exe 1996 dews.exe 1996 dews.exe 1996 dews.exe 1996 dews.exe 1996 dews.exe 1996 dews.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2960 wrote to memory of 1996 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 92 PID 2960 wrote to memory of 1996 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 92 PID 2960 wrote to memory of 1996 2960 edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe 92 PID 1996 wrote to memory of 4764 1996 dews.exe 95 PID 1996 wrote to memory of 4764 1996 dews.exe 95 PID 1996 wrote to memory of 4764 1996 dews.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe"C:\Users\Admin\AppData\Local\Temp\edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\rhombical\dews.exe"C:\Users\Admin\AppData\Local\Temp\edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11N.exe"3⤵PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 6803⤵
- Program crash
PID:2248
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1996 -ip 19961⤵PID:3056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD56dddf5c4823bc73c25d04605626fbad0
SHA1c1a6bad0bd35de4ccaf70337ea697e92f9ff8fa2
SHA256edc39ad29410ede2deca9aa587fe2e35f0818003447ae608569f7de264959d11
SHA5121939d94219c8782d5269159050f18e151da07ff6a4d84c2463c015b731e680b501209f40cab48cc7d56940a1c23ad7ab6fb0032e475a37ff42efd3e6c3f5968f