Analysis
-
max time kernel
109s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 19:07
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_0330086-HYU24111103 그리고 PO #09465610_MQ 00374.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RFQ_0330086-HYU24111103 그리고 PO #09465610_MQ 00374.exe
Resource
win10v2004-20241007-en
General
-
Target
RFQ_0330086-HYU24111103 그리고 PO #09465610_MQ 00374.exe
-
Size
1.9MB
-
MD5
6f4b9a86ae77415b5497874919ddf6d1
-
SHA1
1986f8eb59766fca81c04ee26ce36e6f0aca0a99
-
SHA256
a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8
-
SHA512
8b818fd1531b45a47571dfebdc8730114bbad58ec6db64f81591ee78ea84eee0c07074c38475c994a44b36324b3f22fc3de201e4dc4bfb39019e2700c7c02ba2
-
SSDEEP
49152:FVg5tQ7aWpVDYcHDNYiOE/rvSt7Ch+aodoHwGgQG5:rg56Zhj+iO8SB3DbQ
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
dews.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dews.vbs dews.exe -
Executes dropped EXE 1 IoCs
Processes:
dews.exepid Process 2864 dews.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x000d000000023b57-9.dat autoit_exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2776 2864 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dews.exeRFQ_0330086-HYU24111103 그리고 PO #09465610_MQ 00374.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dews.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ_0330086-HYU24111103 그리고 PO #09465610_MQ 00374.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
RFQ_0330086-HYU24111103 그리고 PO #09465610_MQ 00374.exedews.exedescription pid Process procid_target PID 3180 wrote to memory of 2864 3180 RFQ_0330086-HYU24111103 그리고 PO #09465610_MQ 00374.exe 86 PID 3180 wrote to memory of 2864 3180 RFQ_0330086-HYU24111103 그리고 PO #09465610_MQ 00374.exe 86 PID 3180 wrote to memory of 2864 3180 RFQ_0330086-HYU24111103 그리고 PO #09465610_MQ 00374.exe 86 PID 2864 wrote to memory of 2072 2864 dews.exe 88 PID 2864 wrote to memory of 2072 2864 dews.exe 88 PID 2864 wrote to memory of 2072 2864 dews.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ_0330086-HYU24111103 그리고 PO #09465610_MQ 00374.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_0330086-HYU24111103 그리고 PO #09465610_MQ 00374.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\overrough\dews.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_0330086-HYU24111103 그리고 PO #09465610_MQ 00374.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_0330086-HYU24111103 그리고 PO #09465610_MQ 00374.exe"3⤵PID:2072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 7123⤵
- Program crash
PID:2776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2864 -ip 28641⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD56272d30810ec70134f39538df7ae164f
SHA198319a8bb87d499e8af11fd85b9c91997b71907a
SHA2569d8807a7c8c7f7ffc8d2c01fb220c5614ac411c3a26d31f756def18b994548f0
SHA5120dcf872b19326301b28a703fcacad1badee72868abb12052d9864bd94b1ed7da846c91f0bdb88e2d3886e03de6fe61e89bf9f09c219ab6531a7151fa2468e0d8
-
Filesize
1.9MB
MD56f4b9a86ae77415b5497874919ddf6d1
SHA11986f8eb59766fca81c04ee26ce36e6f0aca0a99
SHA256a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8
SHA5128b818fd1531b45a47571dfebdc8730114bbad58ec6db64f81591ee78ea84eee0c07074c38475c994a44b36324b3f22fc3de201e4dc4bfb39019e2700c7c02ba2