Analysis
-
max time kernel
95s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 15:04
Static task
static1
Behavioral task
behavioral1
Sample
f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe
Resource
win10v2004-20241007-en
General
-
Target
f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe
-
Size
861KB
-
MD5
b036012ff35a5f3738dcd36e5e9d55b1
-
SHA1
560db191d96f9559c11f8cd8c5bdbe7722c75aa8
-
SHA256
f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0
-
SHA512
35f5e6d80cb37ebe4a4de803510ce4d33bb4eddb89e5f4d7e0cdb5811f4b644a1ae1f8ba63ea357f2c6dcc19dbd74428c0834b1982ca40a3a2046e8564600e47
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCc9OU7VuuYxFMU2SL:7JZoQrbTFZY1iaCcYYKFM2L
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3248 3184 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3600 f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3600 wrote to memory of 3284 3600 f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe 86 PID 3600 wrote to memory of 3284 3600 f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe 86 PID 3600 wrote to memory of 3284 3600 f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe 86 PID 3600 wrote to memory of 3184 3600 f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe 87 PID 3600 wrote to memory of 3184 3600 f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe 87 PID 3600 wrote to memory of 3184 3600 f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe 87 PID 3184 wrote to memory of 4848 3184 f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe 88 PID 3184 wrote to memory of 4848 3184 f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe 88 PID 3184 wrote to memory of 4848 3184 f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe"C:\Users\Admin\AppData\Local\Temp\f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe"2⤵PID:3284
-
-
C:\Users\Admin\AppData\Local\Temp\f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe"C:\Users\Admin\AppData\Local\Temp\f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\f77786d716bdf01be933a41a2315e1db3d671e99cc7f2bcae148869becd52fe0.exe"3⤵PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 7283⤵
- Program crash
PID:3248
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3184 -ip 31841⤵PID:2844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203KB
MD5dd9cfd453bdd8944ae5ec2195f3f8ec7
SHA14e556e7a655ef00b8f0a38a5981eb0e1ec96edc8
SHA2569a7d7d8763b6438d1a4610003f79c0c374164bbf8ccedacadb1d02287f94aad1
SHA512dec97c16acf92cfb99ea2de4ea3b61ea50e9017dc9bd873738ccee2785fb94ef6fafa10c366f2f3b19e26d16c45cb64a081bf5eb4ad5b61651f5668cbec1fab7
-
Filesize
168KB
MD5daa3d0359a9600292296b4df206d5174
SHA16e60a7cbe6dd132a8c310eda45cfa303e4ade184
SHA2563fd863890309a873f70a47bd443c4b0c94a502d6b074dea85049d794d0608709
SHA512c7b28096f35a435bc877ef608ea9dc13e13ca963668ad10a7d7f80dcc24170c86a62673da8319686c3ca6234a875d9f6d36d3270996a188deeb3955c83c73f3e