Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:10
Static task
static1
Behavioral task
behavioral1
Sample
9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
anvnzaoum.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
anvnzaoum.exe
Resource
win10v2004-20241007-en
General
-
Target
9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8.exe
-
Size
242KB
-
MD5
4a1c5227914a9c9282c5dcd651a0ccbe
-
SHA1
f4e41cd45bd8786b22dcae6c78c94ec9f2a810a0
-
SHA256
9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8
-
SHA512
9919d1ce07cefaab0b09b9266f01b4983cc2b7d0e8940f9eac0c6e27c471da0e619238fd15c79925471c9658930e59b118a693809b3c8121918eda39fa1af115
-
SSDEEP
6144:LkwMj35iWQXLGEp9Wge0p7+ubCCFd5VYaoVAbqpYEe:i34WQbhmge0Tl5VVoibqpYEe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2148 anvnzaoum.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2088 2148 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language anvnzaoum.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3716 wrote to memory of 2148 3716 9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8.exe 84 PID 3716 wrote to memory of 2148 3716 9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8.exe 84 PID 3716 wrote to memory of 2148 3716 9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8.exe 84 PID 2148 wrote to memory of 2456 2148 anvnzaoum.exe 86 PID 2148 wrote to memory of 2456 2148 anvnzaoum.exe 86 PID 2148 wrote to memory of 2456 2148 anvnzaoum.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8.exe"C:\Users\Admin\AppData\Local\Temp\9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\anvnzaoum.exe"C:\Users\Admin\AppData\Local\Temp\anvnzaoum.exe" C:\Users\Admin\AppData\Local\Temp\xqyifn.vut2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\anvnzaoum.exe"C:\Users\Admin\AppData\Local\Temp\anvnzaoum.exe"3⤵PID:2456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 5723⤵
- Program crash
PID:2088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 2148 -ip 21481⤵PID:4904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5ad7b04bf79722139410e67334277fb3b
SHA1df89d32ebf661b167032342db2a99d9d71279cf0
SHA25675f11c547a4b59ce61b7b920bffabe67c0b0fc763b9e85e3db385c8c7207c2bb
SHA512457e541e5d474441038af606b408af5a70f6bae6f87bbe4ab5d8b5ab753793c72c5ae742647d3c27b17070057319ec435fabe1218acbe49be315def29685610f
-
Filesize
185KB
MD54019e2924dc6b27b051aacbe79f7b0cd
SHA1f345417cfe0a75300164d80370d30c97d005c556
SHA2561fb56f4a15b9ee06b418800b6d8e50cbd65f037c5ba4b9f615b1bfb9b4ae84cb
SHA51274873474a11501c4a7c2dcddb47d3746c71009de5c23d75769b387a6129679e95e6b18a25f605beefd0bdf3f66a4d5a4fdf95c15d27083854dd130c6981a68b3
-
Filesize
5KB
MD59cc7bdc12442ccb434795bb316d484f8
SHA1afb85de2f7b29c4cfc33cb9b1c2941195d062ba5
SHA256e6cd4c005ace5bc1c887ac336f3bcb1e73613818615aa3b159dc63b2b9d59992
SHA512d1daf2c68ac7d3394013615ba62069c4ea605e738e181824d80b060ef3568a7053de6ce7a8d15af6685899ef0c360ca843408f447ffb2037a589aa287cde6e02