Analysis
-
max time kernel
96s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:52
Static task
static1
Behavioral task
behavioral1
Sample
b304ea7c0c21af9a1e1787461fb6577cd05a358fad427a8c33a531449928e700.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b304ea7c0c21af9a1e1787461fb6577cd05a358fad427a8c33a531449928e700.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
rqpwm.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
rqpwm.exe
Resource
win10v2004-20241007-en
General
-
Target
b304ea7c0c21af9a1e1787461fb6577cd05a358fad427a8c33a531449928e700.exe
-
Size
225KB
-
MD5
ffd1f23d797e701acd68c6fafc43ee52
-
SHA1
9d50d54229d7b5c77ef2ff5b2e8383d857a72c78
-
SHA256
b304ea7c0c21af9a1e1787461fb6577cd05a358fad427a8c33a531449928e700
-
SHA512
7ce85f0852546659ff88c74649885599926ad99705afa70403d8f925248c954350b4dec3383e0f9e0aa61ded75b13416dc217eae2064cb3992ed3a67e98b352c
-
SSDEEP
6144:LkwmZ9d0kAbVgQgvIb3w/zpxuDee5rFrTFFkvyIu2:4Z30b8qARe5ZrTkvyk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4788 rqpwm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1260 4788 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rqpwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b304ea7c0c21af9a1e1787461fb6577cd05a358fad427a8c33a531449928e700.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5056 wrote to memory of 4788 5056 b304ea7c0c21af9a1e1787461fb6577cd05a358fad427a8c33a531449928e700.exe 83 PID 5056 wrote to memory of 4788 5056 b304ea7c0c21af9a1e1787461fb6577cd05a358fad427a8c33a531449928e700.exe 83 PID 5056 wrote to memory of 4788 5056 b304ea7c0c21af9a1e1787461fb6577cd05a358fad427a8c33a531449928e700.exe 83 PID 4788 wrote to memory of 452 4788 rqpwm.exe 84 PID 4788 wrote to memory of 452 4788 rqpwm.exe 84 PID 4788 wrote to memory of 452 4788 rqpwm.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b304ea7c0c21af9a1e1787461fb6577cd05a358fad427a8c33a531449928e700.exe"C:\Users\Admin\AppData\Local\Temp\b304ea7c0c21af9a1e1787461fb6577cd05a358fad427a8c33a531449928e700.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\rqpwm.exe"C:\Users\Admin\AppData\Local\Temp\rqpwm.exe" C:\Users\Admin\AppData\Local\Temp\ggzllxjrbu.d2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\rqpwm.exe"C:\Users\Admin\AppData\Local\Temp\rqpwm.exe"3⤵PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 5643⤵
- Program crash
PID:1260
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4788 -ip 47881⤵PID:4204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5e9dc02fcc8d07b8c9fb94bfdafd649dc
SHA14073f8fd24f056a7d1dc8057ac3b9856b3c5acf8
SHA256ebcbf2884bbab2f4659135df86ee673072f4b4de530b703674fbb92731f893cb
SHA512a1abdb620261820d7575c8e9d85a7ef53df46d8980950a3d3db239e72fca86c951306b8066868f61f8b69d25006316d9265317d580eea5012fbfe5ef8e9a0bda
-
Filesize
5KB
MD5eb6b8d229b54bed8469fb9bcebcaa22d
SHA1f4bd8ee98476e8520f2e6b8e014f47002555d7e0
SHA256447204de0bb3b29b0a80fe2d233448dc095825ad00df559278a2a7df01b9be4a
SHA51239ee1775c22328314c2682bbf93252f87cdb03e8d86c612eb8252729b4ae41c06d0953d3f99c925a2747398e2d175d0b76556d37f600f9e4a3c059a24912694c
-
Filesize
65KB
MD5c7b994bf4057f869fbf0fdd87058a5b1
SHA149cd3cb0e992b570ddfb82ee539c91e924fae42d
SHA2569713a086074e9951c6ba4aff6f801c62ca11935aaea623047f21c6b1516174ac
SHA512b3d511e62c54aa201d00b83e520b714efb295a39030b98558d88b499e90b1d2606ca58dbb3aea4e602912ada7c9582738083ae44890b2a183a262bacb8d1b0d9