Analysis
-
max time kernel
92s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 18:23
Behavioral task
behavioral1
Sample
b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82.exe
Resource
win7-20240903-en
General
-
Target
b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82.exe
-
Size
558KB
-
MD5
c65d4758015f3e3428b96dcd37cf7138
-
SHA1
407f4c7a1d548b45cf7dfbe5babc7f41ab787740
-
SHA256
b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82
-
SHA512
9aec87bf42d018a232be1bb1b8a83b1c032f276d6d0290b4eaae0f1c3db0c052631a2ad9158f015f933574d04d2a6b7fe55fd592eba49129473f1da7dbb36c36
-
SSDEEP
12288:K6Wq4aaE6KwyF5L0Y2D1PqL9QoPyW1+Ej/TqVde8G7g:othEVaPqLGo6IbEdjKg
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\parterres.vbs parterres.exe -
Executes dropped EXE 1 IoCs
pid Process 1700 parterres.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1700-17-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral2/memory/3188-19-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral2/memory/1700-36-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/3188-0-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/files/0x0002000000022af2-15.dat upx behavioral2/memory/1700-17-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/3188-19-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/1700-36-0x0000000000400000-0x00000000004D6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2904 1700 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language parterres.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3188 wrote to memory of 1700 3188 b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82.exe 86 PID 3188 wrote to memory of 1700 3188 b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82.exe 86 PID 3188 wrote to memory of 1700 3188 b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82.exe 86 PID 1700 wrote to memory of 232 1700 parterres.exe 87 PID 1700 wrote to memory of 232 1700 parterres.exe 87 PID 1700 wrote to memory of 232 1700 parterres.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82.exe"C:\Users\Admin\AppData\Local\Temp\b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\colliquefaction\parterres.exe"C:\Users\Admin\AppData\Local\Temp\b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82.exe"3⤵PID:232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 7443⤵
- Program crash
PID:2904
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1700 -ip 17001⤵PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD5c65d4758015f3e3428b96dcd37cf7138
SHA1407f4c7a1d548b45cf7dfbe5babc7f41ab787740
SHA256b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82
SHA5129aec87bf42d018a232be1bb1b8a83b1c032f276d6d0290b4eaae0f1c3db0c052631a2ad9158f015f933574d04d2a6b7fe55fd592eba49129473f1da7dbb36c36