Analysis
-
max time kernel
95s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:18
Static task
static1
Behavioral task
behavioral1
Sample
c34886d629b199ebcda6f6fef7fcbf5f48ba3153c6789708639b0c37d4ac5487.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c34886d629b199ebcda6f6fef7fcbf5f48ba3153c6789708639b0c37d4ac5487.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
oryvzibei.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
oryvzibei.exe
Resource
win10v2004-20241007-en
General
-
Target
c34886d629b199ebcda6f6fef7fcbf5f48ba3153c6789708639b0c37d4ac5487.exe
-
Size
304KB
-
MD5
d5949e2ad723b184d5622ce746b0177b
-
SHA1
10f1ec8f4a1ce70546a4ca25965b606ea2bc20ae
-
SHA256
c34886d629b199ebcda6f6fef7fcbf5f48ba3153c6789708639b0c37d4ac5487
-
SHA512
9a98a61a1c4f9a072ca9a809c6d582afd02826a449cfbdf58422b0e5dd7886acad515eae1a575e1097e8445eddc9d648592b62ea3560c51f008a235a1b0fa6c2
-
SSDEEP
6144:RNeZ2KnbGYu/gc3BOsNExg7ncENT33uRh9Y/qAMJJdLZ+cb4YO:RNpKnyXgcxOsNEEcENT33uNIqbJB4cbW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2716 oryvzibei.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3712 2716 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oryvzibei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c34886d629b199ebcda6f6fef7fcbf5f48ba3153c6789708639b0c37d4ac5487.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4780 wrote to memory of 2716 4780 c34886d629b199ebcda6f6fef7fcbf5f48ba3153c6789708639b0c37d4ac5487.exe 82 PID 4780 wrote to memory of 2716 4780 c34886d629b199ebcda6f6fef7fcbf5f48ba3153c6789708639b0c37d4ac5487.exe 82 PID 4780 wrote to memory of 2716 4780 c34886d629b199ebcda6f6fef7fcbf5f48ba3153c6789708639b0c37d4ac5487.exe 82 PID 2716 wrote to memory of 1164 2716 oryvzibei.exe 83 PID 2716 wrote to memory of 1164 2716 oryvzibei.exe 83 PID 2716 wrote to memory of 1164 2716 oryvzibei.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\c34886d629b199ebcda6f6fef7fcbf5f48ba3153c6789708639b0c37d4ac5487.exe"C:\Users\Admin\AppData\Local\Temp\c34886d629b199ebcda6f6fef7fcbf5f48ba3153c6789708639b0c37d4ac5487.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\oryvzibei.exeC:\Users\Admin\AppData\Local\Temp\oryvzibei.exe C:\Users\Admin\AppData\Local\Temp\odifjvp2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\oryvzibei.exeC:\Users\Admin\AppData\Local\Temp\oryvzibei.exe C:\Users\Admin\AppData\Local\Temp\odifjvp3⤵PID:1164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 5403⤵
- Program crash
PID:3712
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2716 -ip 27161⤵PID:2428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5bb1182030e05f8a3c49279a7886ef96c
SHA1aeb622a2f719c27ebc716bee887b8b5ccaeed89e
SHA256d6a52a2e8f8aabb812f26cbb77e8390a8fa4a1304dbfffedd1c641d3c086a53f
SHA512a1b7c11d0b7eb7c5a84406a77ba07833abc925ae2e444e92c9a42558c6b3c80cddaf649dcba4329a19c9a1584b929de0706f7a57744f25c03885d0306e06d947
-
Filesize
4KB
MD50361a9f359f0e790728f7233f15a24ba
SHA1316941b24d00b64baf38a76e3a44596a6bdbef37
SHA25660b3f54da2275f4e7062a18ad72b413db3826d00170a859ec533fb1328758594
SHA51240bb782aff60a54a88a0d0424a6636e6d738f500b491713547c8dc43e69360ab002cb644325537e3eebacc78be654f211c93467f6fcedb603572e2ceb20ec128
-
Filesize
210KB
MD5c73396de899e9b6993217511b2b5e7cb
SHA18d7d0831a5cbfe70f91fc1d987cd2de806b8f72c
SHA256fb95f337130d5653a230b63f2d7d3ca3148cc1ca74274f90e031904bb1cc2a19
SHA5122a014ed6e834f812d3f0228fbc879871ffa51003ffb8adc1c8639ba8e2ee42a5551cee567379307106bf183b5ed5a5b6a15352327579b5ee15106da4fe4bdb1e