Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
yjpsyjwo.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
yjpsyjwo.exe
Resource
win10v2004-20241007-en
General
-
Target
79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe
-
Size
313KB
-
MD5
da75710d466d2544bc8f4442b1ce57eb
-
SHA1
8356ff061e4864bfe114fb9e65bed20c267c78e3
-
SHA256
79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917
-
SHA512
6d5c8f28f60bd494cade7bf4324c3309ac29a421202dae3494b8118ade429560e4062a2c83bacbfea46c63fe173bc04ffc299b8dcd2f611d67c45e7cf2c22695
-
SSDEEP
6144:TxD3m22lVTV6BSLia0bfMUB8uEqLjLQ7LYAbesH/pAK+eRBYBD:Vm246BSLTkfN8ubLj4Uy/pAKaD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3476 yjpsyjwo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4848 3476 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yjpsyjwo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4884 wrote to memory of 3476 4884 79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe 83 PID 4884 wrote to memory of 3476 4884 79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe 83 PID 4884 wrote to memory of 3476 4884 79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe 83 PID 3476 wrote to memory of 3708 3476 yjpsyjwo.exe 84 PID 3476 wrote to memory of 3708 3476 yjpsyjwo.exe 84 PID 3476 wrote to memory of 3708 3476 yjpsyjwo.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe"C:\Users\Admin\AppData\Local\Temp\79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\yjpsyjwo.exeC:\Users\Admin\AppData\Local\Temp\yjpsyjwo.exe C:\Users\Admin\AppData\Local\Temp\vhdpeghnoh2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\yjpsyjwo.exeC:\Users\Admin\AppData\Local\Temp\yjpsyjwo.exe C:\Users\Admin\AppData\Local\Temp\vhdpeghnoh3⤵PID:3708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 5323⤵
- Program crash
PID:4848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3476 -ip 34761⤵PID:2100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD50166caeddc243f04eacfbf1f056a30d9
SHA168e0ee392397414c1162ddea3b195ab0204006ae
SHA25643bcdc82047a603ae2e2d2635c1d3dcfa22a5e08808b3a5c2dbef4e648af75ff
SHA512b03886ebefa1fa2f5be8739cca14fb5e62a40e5d07c0d254e664f77cee8e135f9c6160aa619a85346fb426154cab4acefe63dad9299c828f3c5f1225015b7c02
-
Filesize
210KB
MD5120e3f53c350aa1ea669ee65d35507cf
SHA1d935f721cb06ab56b6d8a8a24f1bdbbd9c78a1a0
SHA2564225889013fa833a51d12ce224d672444e281daa6d295fb83b5fc189db657418
SHA5120d9f08105562005031f7533d8034b09565ae866318c7bd1ef9df5844e1da5147bc4c6904223268af918120ead6c6517750fd6fa5ef76f8723e86c050fb29f10c
-
Filesize
168KB
MD5c55e114aae523179f507d32858962fe4
SHA13a35f75de10123d4b438d7be88c6bae7087a9a74
SHA256445868ae39772e2a65c0e927d6a98d240d93c8515d57837b95c17304ea0dd693
SHA5123900a645770ed43ab18de621f85f83588efe9fafee732277ee26e361dc417560a0aacea392d7975634e16f250734dea1f15c8aa26fb8b80c31bec1833da9044c