Analysis

  • max time kernel
    93s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:31

General

  • Target

    purchase inquiry/purchase inquiry.exe

  • Size

    478KB

  • MD5

    7b609be1e4a80e64255bae244ccbd7d9

  • SHA1

    7fdafd903951c4d001c4ee166a56e84ab521b148

  • SHA256

    a502d5124ce1a2f6cf2b1daba71b936c4ef0c0b876a59393309311af4530b2a3

  • SHA512

    0923ed7453eae902e7cc7cca6e33cfa7353c1c9115cf5de0022b519c645bdb77bc7fa09d2a63d29f63719d6257f29b9cbadbf2de833831063bff8e4c486d4125

  • SSDEEP

    6144:qGiVg8tb1jW/xx8gTnEc8LTMVQc+W2X9sAgxHrK431F86YmhvTOMC4xx+hsl:ktBsAQEcMT9s2X9qE0FyCx+Gl

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\purchase inquiry\purchase inquiry.exe
    "C:\Users\Admin\AppData\Local\Temp\purchase inquiry\purchase inquiry.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3964
    • C:\Users\Admin\AppData\Local\Temp\purchase inquiry\purchase inquiry.exe
      "C:\Users\Admin\AppData\Local\Temp\purchase inquiry\purchase inquiry.exe"
      2⤵
        PID:4004
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 952
        2⤵
        • Program crash
        PID:4600
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3964 -ip 3964
      1⤵
        PID:2936

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\nsa7AAF.tmp\kqzumo.dll

        Filesize

        113KB

        MD5

        308631a500f8d984dee36b054ed45c1d

        SHA1

        aea27d0fa8574d6dd40fdd8525a08083ae2dbda2

        SHA256

        af3b4ee5be463951c6c7c2dfd2303391f42c64bd54b74fbbfd89db54e35023c7

        SHA512

        5e72932cf8e46163e9f9185c3d66f9776a0edcf853bad8963efdbe63ed0c8c5f7ec3c990abfec54c5bb79cbdbfe469fd6598b2c37c1598433ca2f7faf2bb7f2a

      • memory/3964-5-0x0000000010000000-0x0000000010021000-memory.dmp

        Filesize

        132KB

      • memory/3964-9-0x0000000010000000-0x0000000010021000-memory.dmp

        Filesize

        132KB