Analysis
-
max time kernel
99s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:23
Static task
static1
Behavioral task
behavioral1
Sample
Drawing.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Drawing.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
kwwsdijia.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
kwwsdijia.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Spare part list.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Spare part list.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
rkkzui.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
rkkzui.exe
Resource
win10v2004-20241007-en
General
-
Target
Drawing.exe
-
Size
659KB
-
MD5
dbccfac98a87f688ab798921d7cb9524
-
SHA1
43a73100212a251590045f14c74b14544362ecb6
-
SHA256
d1b0a3c99d853a482c44e0d10cc3507983e1c4e0c862a5c72f24d2044280c1e0
-
SHA512
a0652b07d445e918c07e40383044fb2ca61a75f4c7aca965b36beffe0987fa371cdffe6a2ffb841b8a86073c5edc68c96ab18a394bb0a8b3e89fa79b30ae61ff
-
SSDEEP
6144:2NeZhGRARDdq3EtPMBMqSsU30PI3FG7gXGhl5Ti2ztyUGTSPiTrufZ5wES06cgG2:2N4uoNtTVPXiDiyn4BufL9PNgdOut
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1532 kwwsdijia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2604 1532 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Drawing.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kwwsdijia.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4080 wrote to memory of 1532 4080 Drawing.exe 82 PID 4080 wrote to memory of 1532 4080 Drawing.exe 82 PID 4080 wrote to memory of 1532 4080 Drawing.exe 82 PID 1532 wrote to memory of 1680 1532 kwwsdijia.exe 83 PID 1532 wrote to memory of 1680 1532 kwwsdijia.exe 83 PID 1532 wrote to memory of 1680 1532 kwwsdijia.exe 83 PID 1532 wrote to memory of 1680 1532 kwwsdijia.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Drawing.exe"C:\Users\Admin\AppData\Local\Temp\Drawing.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\kwwsdijia.exeC:\Users\Admin\AppData\Local\Temp\kwwsdijia.exe C:\Users\Admin\AppData\Local\Temp\rnxvcwia2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\kwwsdijia.exeC:\Users\Admin\AppData\Local\Temp\kwwsdijia.exe C:\Users\Admin\AppData\Local\Temp\rnxvcwia3⤵PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 5403⤵
- Program crash
PID:2604
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1532 -ip 15321⤵PID:4124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5a18234592746844a5f6b6194dec2f5ab
SHA1c3d72898f3de2a02950b39aa6dd8cea20e8a5b56
SHA256435bb5fb4de9e7773cd4a1220a493031b7d40b432093cf85d65e04d96162043d
SHA51237817ce424fdfd9cad4986af43eee6224796cbd8bc85f740c8d3a625e96496255747b9e3b02d66d47094e42dd0cb339d292817ff091a746216e63c7c0e5eb35c
-
Filesize
4KB
MD50b70cb345538f08f82d8f9fc2aad7830
SHA144a374fe05691165214657f1269d9d01d84fcf6e
SHA25693eff5a1cdcd83a8ad32e4f3122f31baf07fae3502d1765edf467b76fce07288
SHA51227c20b4e4fbc5923a1e8e4a079de46d42d37e7d266d72181bde79db07f177005ebd1caae2de651b077a92f1a5a387d5e60b6663ae7f0550d2dad332e566cfdbc
-
Filesize
5KB
MD51630f2f2128004a1065bf6da2e1d3e0a
SHA1e6e0aa51141b8ab82a48756f4b5df15701f7d3ce
SHA256adb35069bfa1334e933f454e3f14dcb4cf0edca79f31ab12b77ea25fcdc9a756
SHA5120997b532307a47ec29eee8b309329c1bb8658b3ed54027c52981b763fcaba30cbb81efe61d1cb8c28cbae6108a5ed3d50d80c2add3ea214764f1d330065b4085