Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
purchase inquiry/purchase inquiry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
purchase inquiry/purchase inquiry.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/kqzumo.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/kqzumo.dll
Resource
win10v2004-20241007-en
General
-
Target
purchase inquiry/purchase inquiry.exe
-
Size
478KB
-
MD5
7b609be1e4a80e64255bae244ccbd7d9
-
SHA1
7fdafd903951c4d001c4ee166a56e84ab521b148
-
SHA256
a502d5124ce1a2f6cf2b1daba71b936c4ef0c0b876a59393309311af4530b2a3
-
SHA512
0923ed7453eae902e7cc7cca6e33cfa7353c1c9115cf5de0022b519c645bdb77bc7fa09d2a63d29f63719d6257f29b9cbadbf2de833831063bff8e4c486d4125
-
SSDEEP
6144:qGiVg8tb1jW/xx8gTnEc8LTMVQc+W2X9sAgxHrK431F86YmhvTOMC4xx+hsl:ktBsAQEcMT9s2X9qE0FyCx+Gl
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3964 purchase inquiry.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4600 3964 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language purchase inquiry.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3964 wrote to memory of 4004 3964 purchase inquiry.exe 82 PID 3964 wrote to memory of 4004 3964 purchase inquiry.exe 82 PID 3964 wrote to memory of 4004 3964 purchase inquiry.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\purchase inquiry\purchase inquiry.exe"C:\Users\Admin\AppData\Local\Temp\purchase inquiry\purchase inquiry.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\purchase inquiry\purchase inquiry.exe"C:\Users\Admin\AppData\Local\Temp\purchase inquiry\purchase inquiry.exe"2⤵PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 9522⤵
- Program crash
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3964 -ip 39641⤵PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD5308631a500f8d984dee36b054ed45c1d
SHA1aea27d0fa8574d6dd40fdd8525a08083ae2dbda2
SHA256af3b4ee5be463951c6c7c2dfd2303391f42c64bd54b74fbbfd89db54e35023c7
SHA5125e72932cf8e46163e9f9185c3d66f9776a0edcf853bad8963efdbe63ed0c8c5f7ec3c990abfec54c5bb79cbdbfe469fd6598b2c37c1598433ca2f7faf2bb7f2a