Analysis

  • max time kernel
    135s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:10

General

  • Target

    9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8.exe

  • Size

    242KB

  • MD5

    4a1c5227914a9c9282c5dcd651a0ccbe

  • SHA1

    f4e41cd45bd8786b22dcae6c78c94ec9f2a810a0

  • SHA256

    9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8

  • SHA512

    9919d1ce07cefaab0b09b9266f01b4983cc2b7d0e8940f9eac0c6e27c471da0e619238fd15c79925471c9658930e59b118a693809b3c8121918eda39fa1af115

  • SSDEEP

    6144:LkwMj35iWQXLGEp9Wge0p7+ubCCFd5VYaoVAbqpYEe:i34WQbhmge0Tl5VVoibqpYEe

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8.exe
    "C:\Users\Admin\AppData\Local\Temp\9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3716
    • C:\Users\Admin\AppData\Local\Temp\anvnzaoum.exe
      "C:\Users\Admin\AppData\Local\Temp\anvnzaoum.exe" C:\Users\Admin\AppData\Local\Temp\xqyifn.vut
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Users\Admin\AppData\Local\Temp\anvnzaoum.exe
        "C:\Users\Admin\AppData\Local\Temp\anvnzaoum.exe"
        3⤵
          PID:2456
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 572
          3⤵
          • Program crash
          PID:2088
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 2148 -ip 2148
      1⤵
        PID:4904

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\anvnzaoum.exe

        Filesize

        49KB

        MD5

        ad7b04bf79722139410e67334277fb3b

        SHA1

        df89d32ebf661b167032342db2a99d9d71279cf0

        SHA256

        75f11c547a4b59ce61b7b920bffabe67c0b0fc763b9e85e3db385c8c7207c2bb

        SHA512

        457e541e5d474441038af606b408af5a70f6bae6f87bbe4ab5d8b5ab753793c72c5ae742647d3c27b17070057319ec435fabe1218acbe49be315def29685610f

      • C:\Users\Admin\AppData\Local\Temp\plijr.ysv

        Filesize

        185KB

        MD5

        4019e2924dc6b27b051aacbe79f7b0cd

        SHA1

        f345417cfe0a75300164d80370d30c97d005c556

        SHA256

        1fb56f4a15b9ee06b418800b6d8e50cbd65f037c5ba4b9f615b1bfb9b4ae84cb

        SHA512

        74873474a11501c4a7c2dcddb47d3746c71009de5c23d75769b387a6129679e95e6b18a25f605beefd0bdf3f66a4d5a4fdf95c15d27083854dd130c6981a68b3

      • C:\Users\Admin\AppData\Local\Temp\xqyifn.vut

        Filesize

        5KB

        MD5

        9cc7bdc12442ccb434795bb316d484f8

        SHA1

        afb85de2f7b29c4cfc33cb9b1c2941195d062ba5

        SHA256

        e6cd4c005ace5bc1c887ac336f3bcb1e73613818615aa3b159dc63b2b9d59992

        SHA512

        d1daf2c68ac7d3394013615ba62069c4ea605e738e181824d80b060ef3568a7053de6ce7a8d15af6685899ef0c360ca843408f447ffb2037a589aa287cde6e02

      • memory/2148-7-0x00000000004F0000-0x00000000004F2000-memory.dmp

        Filesize

        8KB