Analysis

  • max time kernel
    94s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 05:52

General

  • Target

    faae62d9ef3a65ae1dae20d55b8e787661aaf452ad3b6bdd80ea267d3bd070bd.exe

  • Size

    732KB

  • MD5

    659ac9c3f3c0fffb292704cb5e7dd699

  • SHA1

    a3ee2528280cd762c130f680af08583df22bb435

  • SHA256

    faae62d9ef3a65ae1dae20d55b8e787661aaf452ad3b6bdd80ea267d3bd070bd

  • SHA512

    0b99ae205eb06e39f0befef1c41776cbddda78e674c639eb51968bba4b70aad45cc7b0dbf4ad9bed12a7a82ac31943185b8f59aab082afb15d9b91924889db10

  • SSDEEP

    12288:fnWjC9X31+oqH0GOzM6/79OBu5hq9ZvbY:fUC1lmvO3/Ih9pY

Malware Config

Extracted

Family

privateloader

C2

http://212.193.30.45/proxies.txt

http://85.202.169.116/server.txt

pastebin.com/raw/A7dSG1te

http://wfsdragon.ru/api/setStats.php

85.202.169.116

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Privateloader family
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\faae62d9ef3a65ae1dae20d55b8e787661aaf452ad3b6bdd80ea267d3bd070bd.exe
    "C:\Users\Admin\AppData\Local\Temp\faae62d9ef3a65ae1dae20d55b8e787661aaf452ad3b6bdd80ea267d3bd070bd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\faae62d9ef3a65ae1dae20d55b8e787661aaf452ad3b6bdd80ea267d3bd070bd.exe
      "C:\Users\Admin\AppData\Local\Temp\faae62d9ef3a65ae1dae20d55b8e787661aaf452ad3b6bdd80ea267d3bd070bd.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4436
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 232
        3⤵
        • Program crash
        PID:1268
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4436 -ip 4436
    1⤵
      PID:2804

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2016-0-0x000000007457E000-0x000000007457F000-memory.dmp

      Filesize

      4KB

    • memory/2016-1-0x0000000000C70000-0x0000000000D6A000-memory.dmp

      Filesize

      1000KB

    • memory/2016-2-0x00000000051A0000-0x00000000051A1000-memory.dmp

      Filesize

      4KB

    • memory/2016-3-0x0000000005C20000-0x00000000061C4000-memory.dmp

      Filesize

      5.6MB

    • memory/2016-4-0x0000000074570000-0x0000000074D20000-memory.dmp

      Filesize

      7.7MB

    • memory/2016-16-0x0000000074570000-0x0000000074D20000-memory.dmp

      Filesize

      7.7MB

    • memory/4436-11-0x0000000000700000-0x0000000000738000-memory.dmp

      Filesize

      224KB

    • memory/4436-15-0x0000000000700000-0x0000000000738000-memory.dmp

      Filesize

      224KB

    • memory/4436-7-0x0000000000700000-0x0000000000738000-memory.dmp

      Filesize

      224KB