Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:55
Static task
static1
Behavioral task
behavioral1
Sample
5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
sekfuer.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
sekfuer.exe
Resource
win10v2004-20241007-en
General
-
Target
5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe
-
Size
318KB
-
MD5
7b3ac47b7e0a3b84ae5a4a34c3b37503
-
SHA1
6b73e3bcff26f7b9d805bdf839271478e10d3aa9
-
SHA256
5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10
-
SHA512
dcb5b2ee9a55376699a733be65f8fdc5f482d2305447c67341577b40aabc9d27b34a76beb328daf3478ecd23e47d2064fb4b419f89cc3d2e0673e0c755d11105
-
SSDEEP
6144:TxDuIshmUqiRw6gPmFyggTDL40FbL5COzewlSUeGaSH+g:EIJ3hg9OHJCOa4FeGaDg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4640 sekfuer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3652 4640 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sekfuer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2816 wrote to memory of 4640 2816 5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe 83 PID 2816 wrote to memory of 4640 2816 5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe 83 PID 2816 wrote to memory of 4640 2816 5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe 83 PID 4640 wrote to memory of 4564 4640 sekfuer.exe 84 PID 4640 wrote to memory of 4564 4640 sekfuer.exe 84 PID 4640 wrote to memory of 4564 4640 sekfuer.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe"C:\Users\Admin\AppData\Local\Temp\5f475f3f7c27c744afe9f860d0e0c93c6acabb6eec8a222118a498d0f8816a10.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\sekfuer.exeC:\Users\Admin\AppData\Local\Temp\sekfuer.exe C:\Users\Admin\AppData\Local\Temp\kxvtoctk2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\sekfuer.exeC:\Users\Admin\AppData\Local\Temp\sekfuer.exe C:\Users\Admin\AppData\Local\Temp\kxvtoctk3⤵PID:4564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 5963⤵
- Program crash
PID:3652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4640 -ip 46401⤵PID:3100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5d6b23032a09ffeb6abcde5d358a4a811
SHA1f38ceb3fb628a218f6e622b664487a5fc7e9cbe5
SHA256e9c6a985773580b2c3bbce4b42e8bffea84c4fd682588cbf1c8ff4c6a4a2604c
SHA512a0d379a6426fbb6eb368935fc5fdf0c168ea7742f324cf0dbec2e3987c86ee9967fccad309b3d525bf1f371a66f6d4a843b48a30f8ec9a161a94d052dc9c5c15
-
Filesize
4KB
MD503f193756bc6453453b4211edc08b400
SHA18d51ca5d3ccbcc6b596ccc318c79e4b041cc7917
SHA256920d6c6a4ef09c4e3bbc4b9b609bc0992d19dd64d1243e16a030ad31e4c8dc3e
SHA512b33fd3a30a3f9e19054543f6fc6ed4d7dc730715fc92f4c5a8403ac8f0d4e94a5c5222ffda32dcfed4aa8ce6bf351a59ea6610c819975893bcad2f9b1696bbcd
-
Filesize
175KB
MD5726feddb203f26ef36c573c5305d97f8
SHA10c88f5fe319fc16f18f924d57837c1cd8e1ddc07
SHA2566c1038acb3f2815c1e332a37fac58ec85cf3737a6e6792e2dbf6a0a2c0ed00c4
SHA51223ec28b39d0ab1c6dbc2fc2b9f7331a2610df03492522842517d41c52dffecf92d3ee688612134697495e5184f9ec8ac066e0b092eb637967ea5f220e83dd99a