Analysis
-
max time kernel
94s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:28
Behavioral task
behavioral1
Sample
968e6728a9e909dbcce429b21731f83a.exe
Resource
win7-20240708-en
General
-
Target
968e6728a9e909dbcce429b21731f83a.exe
-
Size
574KB
-
MD5
968e6728a9e909dbcce429b21731f83a
-
SHA1
231a29a43cbb83bf714634efdcfc6076f820bcc2
-
SHA256
9589e2ffa7b1e7adb7b29587e34acc76b49e4613c6ef7297447dd7a0c9cb4183
-
SHA512
62969b3ecee6eff2c80963f3c1ee43d1e4ae7f9af171bd48a5b0fe0e1fd7567f7f449916226c205a14b091fb81758bd18fc573fbfc87174a84056e2d8df7c18b
-
SSDEEP
12288:VXe9PPlowWX0t6mOQwg1Qd15CcYk0We1YR2P1b2U48+woOO:chloDX0XOf4/YUbhLO
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4616-11-0x0000000000400000-0x000000000054A000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/4616-0-0x0000000000400000-0x000000000054A000-memory.dmp upx behavioral2/memory/4616-11-0x0000000000400000-0x000000000054A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2796 4616 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 968e6728a9e909dbcce429b21731f83a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4616 wrote to memory of 2080 4616 968e6728a9e909dbcce429b21731f83a.exe 82 PID 4616 wrote to memory of 2080 4616 968e6728a9e909dbcce429b21731f83a.exe 82 PID 4616 wrote to memory of 2080 4616 968e6728a9e909dbcce429b21731f83a.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\968e6728a9e909dbcce429b21731f83a.exe"C:\Users\Admin\AppData\Local\Temp\968e6728a9e909dbcce429b21731f83a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\968e6728a9e909dbcce429b21731f83a.exe"C:\Users\Admin\AppData\Local\Temp\968e6728a9e909dbcce429b21731f83a.exe"2⤵PID:2080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 7402⤵
- Program crash
PID:2796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4616 -ip 46161⤵PID:1368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5a2a86d4f02c8419169dcab682b20f931
SHA132f103dde1f0d0a4da19623b242d3ded1cecc25d
SHA256cf2dd031acf1a3669c773a7603bba51560ec2df2033d04018a33d9dba3592255
SHA51264d3be8902468cf9e8ef25b9af3640a31926e9f67e03a79e150d17dc6c96ba4c68ea46f1e8258654599e24771d9f292b5f70cfbbaf50dab8e97e6b19e5d537ed