Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:10

General

  • Target

    f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe

  • Size

    352KB

  • MD5

    fc7eb63804088472b1cac1ac9fe5d16f

  • SHA1

    63205c7b5c84296478f1ad7d335aa06b8b7da536

  • SHA256

    f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a

  • SHA512

    57c0dcf7689e04e172d4adfdd6295618cb5695034739a4c57d0fd871b864345e54dd05ed5c3475579ff742c947202618c59db0ea351f52521e1cf7622f007734

  • SSDEEP

    6144:UwxU76BJzteu9g8LJId0ER61it8LeZf5sm22UPLwkkBPPmK4vQniV:JU74eYg8ddER6C8LCKJ6PPmJvQiV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe
    "C:\Users\Admin\AppData\Local\Temp\f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe
      C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe C:\Users\Admin\AppData\Local\Temp\krqtdytaag
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe
        C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe C:\Users\Admin\AppData\Local\Temp\krqtdytaag
        3⤵
          PID:4472
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 508
          3⤵
          • Program crash
          PID:2980
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1608 -ip 1608
      1⤵
        PID:384

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\krqtdytaag

        Filesize

        4KB

        MD5

        b2e7c8631c39f0df1e14be81e7482aaf

        SHA1

        886c520daf38b08b4d32f3f522375cca39ad2c0b

        SHA256

        eee2111c310af6f27fa8e5eb4a9378302bcd4a2a32397ca39119cd057158425f

        SHA512

        1e858289210242b9fd87991e56f4db7fd30f3888fca4e8d78e845f781cdfee3ef508304c09f5d59c656ae933e67f6b9471ea7459721698a4cbedd39d6b7a7e6c

      • C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe

        Filesize

        117KB

        MD5

        918b5b3ab8c29f68394eb7017a42aa85

        SHA1

        1a783f39a9ed81412bc018a0d54a116bf9de3277

        SHA256

        b4e506d84bae993428232dd52683753944461f639b7228639be20000563a96e3

        SHA512

        4a50d82e01690f12f6254f31f11db1fe69d40891b84675d4db25b55b90eb58a078ddafbeb125330df7dec31c6d6af752186ba57a05fd9eb5b6592b636885f672

      • C:\Users\Admin\AppData\Local\Temp\l3vfu7hizn2

        Filesize

        210KB

        MD5

        5250e815ed0a5fb4eb4f2c9675dfb7e8

        SHA1

        46a0b7ddfd941e667e1201dd511a22b9a981cd3d

        SHA256

        0439dbfaa3df7150e41a27bf65f511c3ebb4c1fbbf8b005983c51013b496bc0c

        SHA512

        e31ebda956be17a00e2632a1a10e25dc3070a5feda166354c8dec5accd52e10c353d22ec5447f87f489f24163cd17bbd26a9d50cd3ec48063409293341702cf9

      • memory/1608-8-0x0000000000440000-0x0000000000442000-memory.dmp

        Filesize

        8KB