Analysis

  • max time kernel
    99s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:23

General

  • Target

    Drawing.exe

  • Size

    659KB

  • MD5

    dbccfac98a87f688ab798921d7cb9524

  • SHA1

    43a73100212a251590045f14c74b14544362ecb6

  • SHA256

    d1b0a3c99d853a482c44e0d10cc3507983e1c4e0c862a5c72f24d2044280c1e0

  • SHA512

    a0652b07d445e918c07e40383044fb2ca61a75f4c7aca965b36beffe0987fa371cdffe6a2ffb841b8a86073c5edc68c96ab18a394bb0a8b3e89fa79b30ae61ff

  • SSDEEP

    6144:2NeZhGRARDdq3EtPMBMqSsU30PI3FG7gXGhl5Ti2ztyUGTSPiTrufZ5wES06cgG2:2N4uoNtTVPXiDiyn4BufL9PNgdOut

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Drawing.exe
    "C:\Users\Admin\AppData\Local\Temp\Drawing.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Users\Admin\AppData\Local\Temp\kwwsdijia.exe
      C:\Users\Admin\AppData\Local\Temp\kwwsdijia.exe C:\Users\Admin\AppData\Local\Temp\rnxvcwia
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Users\Admin\AppData\Local\Temp\kwwsdijia.exe
        C:\Users\Admin\AppData\Local\Temp\kwwsdijia.exe C:\Users\Admin\AppData\Local\Temp\rnxvcwia
        3⤵
          PID:1680
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 540
          3⤵
          • Program crash
          PID:2604
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1532 -ip 1532
      1⤵
        PID:4124

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\a4vlxs9uvejnijj

        Filesize

        211KB

        MD5

        a18234592746844a5f6b6194dec2f5ab

        SHA1

        c3d72898f3de2a02950b39aa6dd8cea20e8a5b56

        SHA256

        435bb5fb4de9e7773cd4a1220a493031b7d40b432093cf85d65e04d96162043d

        SHA512

        37817ce424fdfd9cad4986af43eee6224796cbd8bc85f740c8d3a625e96496255747b9e3b02d66d47094e42dd0cb339d292817ff091a746216e63c7c0e5eb35c

      • C:\Users\Admin\AppData\Local\Temp\kwwsdijia.exe

        Filesize

        4KB

        MD5

        0b70cb345538f08f82d8f9fc2aad7830

        SHA1

        44a374fe05691165214657f1269d9d01d84fcf6e

        SHA256

        93eff5a1cdcd83a8ad32e4f3122f31baf07fae3502d1765edf467b76fce07288

        SHA512

        27c20b4e4fbc5923a1e8e4a079de46d42d37e7d266d72181bde79db07f177005ebd1caae2de651b077a92f1a5a387d5e60b6663ae7f0550d2dad332e566cfdbc

      • C:\Users\Admin\AppData\Local\Temp\rnxvcwia

        Filesize

        5KB

        MD5

        1630f2f2128004a1065bf6da2e1d3e0a

        SHA1

        e6e0aa51141b8ab82a48756f4b5df15701f7d3ce

        SHA256

        adb35069bfa1334e933f454e3f14dcb4cf0edca79f31ab12b77ea25fcdc9a756

        SHA512

        0997b532307a47ec29eee8b309329c1bb8658b3ed54027c52981b763fcaba30cbb81efe61d1cb8c28cbae6108a5ed3d50d80c2add3ea214764f1d330065b4085

      • memory/1532-8-0x00000000014E0000-0x00000000014E2000-memory.dmp

        Filesize

        8KB