Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:10
Static task
static1
Behavioral task
behavioral1
Sample
f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ktvrnf.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ktvrnf.exe
Resource
win10v2004-20241007-en
General
-
Target
f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe
-
Size
352KB
-
MD5
fc7eb63804088472b1cac1ac9fe5d16f
-
SHA1
63205c7b5c84296478f1ad7d335aa06b8b7da536
-
SHA256
f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a
-
SHA512
57c0dcf7689e04e172d4adfdd6295618cb5695034739a4c57d0fd871b864345e54dd05ed5c3475579ff742c947202618c59db0ea351f52521e1cf7622f007734
-
SSDEEP
6144:UwxU76BJzteu9g8LJId0ER61it8LeZf5sm22UPLwkkBPPmK4vQniV:JU74eYg8ddER6C8LCKJ6PPmJvQiV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1608 ktvrnf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2980 1608 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ktvrnf.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3144 wrote to memory of 1608 3144 f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe 83 PID 3144 wrote to memory of 1608 3144 f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe 83 PID 3144 wrote to memory of 1608 3144 f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe 83 PID 1608 wrote to memory of 4472 1608 ktvrnf.exe 84 PID 1608 wrote to memory of 4472 1608 ktvrnf.exe 84 PID 1608 wrote to memory of 4472 1608 ktvrnf.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe"C:\Users\Admin\AppData\Local\Temp\f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\ktvrnf.exeC:\Users\Admin\AppData\Local\Temp\ktvrnf.exe C:\Users\Admin\AppData\Local\Temp\krqtdytaag2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\ktvrnf.exeC:\Users\Admin\AppData\Local\Temp\ktvrnf.exe C:\Users\Admin\AppData\Local\Temp\krqtdytaag3⤵PID:4472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 5083⤵
- Program crash
PID:2980
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1608 -ip 16081⤵PID:384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5b2e7c8631c39f0df1e14be81e7482aaf
SHA1886c520daf38b08b4d32f3f522375cca39ad2c0b
SHA256eee2111c310af6f27fa8e5eb4a9378302bcd4a2a32397ca39119cd057158425f
SHA5121e858289210242b9fd87991e56f4db7fd30f3888fca4e8d78e845f781cdfee3ef508304c09f5d59c656ae933e67f6b9471ea7459721698a4cbedd39d6b7a7e6c
-
Filesize
117KB
MD5918b5b3ab8c29f68394eb7017a42aa85
SHA11a783f39a9ed81412bc018a0d54a116bf9de3277
SHA256b4e506d84bae993428232dd52683753944461f639b7228639be20000563a96e3
SHA5124a50d82e01690f12f6254f31f11db1fe69d40891b84675d4db25b55b90eb58a078ddafbeb125330df7dec31c6d6af752186ba57a05fd9eb5b6592b636885f672
-
Filesize
210KB
MD55250e815ed0a5fb4eb4f2c9675dfb7e8
SHA146a0b7ddfd941e667e1201dd511a22b9a981cd3d
SHA2560439dbfaa3df7150e41a27bf65f511c3ebb4c1fbbf8b005983c51013b496bc0c
SHA512e31ebda956be17a00e2632a1a10e25dc3070a5feda166354c8dec5accd52e10c353d22ec5447f87f489f24163cd17bbd26a9d50cd3ec48063409293341702cf9