Analysis

  • max time kernel
    97s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 20:32

General

  • Target

    malware/loader1.exe

  • Size

    233KB

  • MD5

    b347d8b2e90e11981f6895be59b5f30c

  • SHA1

    fecff17fe981b71deaa00b7522833f2a9c3ffee7

  • SHA256

    10ccac80baa31a7a96f2b73fe158db6b699f27f9b89af9692a0ccc152802fb12

  • SHA512

    c812ea37eccc072a73ff4e1c81eb29b1b5ca2eda5a02c1fae2955cee49d0b770bfa7437e9f67ea15f39838d75c546da6a8359a616f537dd7ab785d0fbfcc617c

  • SSDEEP

    6144:HNeZmtzTH8yzLyIjNv3Sy+BsSuLagm4ZPvX/yMB6Z:HNltzTH8ULLjU1spaIPvLW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\malware\loader1.exe
    "C:\Users\Admin\AppData\Local\Temp\malware\loader1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4012
    • C:\Users\Admin\AppData\Local\Temp\dnjdbaa.exe
      C:\Users\Admin\AppData\Local\Temp\dnjdbaa.exe C:\Users\Admin\AppData\Local\Temp\ifurxc
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Users\Admin\AppData\Local\Temp\dnjdbaa.exe
        C:\Users\Admin\AppData\Local\Temp\dnjdbaa.exe C:\Users\Admin\AppData\Local\Temp\ifurxc
        3⤵
          PID:4932
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 556
          3⤵
          • Program crash
          PID:4068
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2592 -ip 2592
      1⤵
        PID:2832

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\dnjdbaa.exe

              Filesize

              3KB

              MD5

              b17e11409b97808d802c27523541dcab

              SHA1

              0c880010d7d33b0f60ba731245d0b016387c8621

              SHA256

              47e37b53746d8769b8c78851a402fa40698c3fb7437c6f922df1de9053e4d366

              SHA512

              ccc80355178322133ef878d42663eb583916598264b9f7039719ddac54fdccd1d7007d3414d35170de5ad61d4b4ecdd6cd8b26f48fc447e200a4e650c5c7504f

            • C:\Users\Admin\AppData\Local\Temp\ifurxc

              Filesize

              5KB

              MD5

              564404622cc45811094239bb48180520

              SHA1

              03550cbb37594de047ebf4937ace97b783c3abe1

              SHA256

              c32e18df9ee36fb4f956d0a4c48bbf3d5a8bdb7b5a86c9bd729f3080876e5c4d

              SHA512

              48e64bed19c3152bcace0b9152701af0ed79c5beb17e6fd3154e12df12edd4b3ad75a037e349a6cb63383ba0ba0afbc276935d011d4298e6f0234d6aabb81e9b

            • C:\Users\Admin\AppData\Local\Temp\u7f7s62srqfy

              Filesize

              212KB

              MD5

              e2ce09ee85297e044745003984203e44

              SHA1

              193813df25ccb863395e87e11984deeaae9e88ab

              SHA256

              e8bc54273d1524f120ff7063806b6eabd5fe4651a2e94f3ff2bee6915d1d8de1

              SHA512

              0d18e7b6942ecd913968f7943634165762afde56a0b4ce22841d453fecd4eb9adf513fed3268c318c2500bfeadf05dd948a17e29eaed3bc13d202064564d4829

            • memory/2592-8-0x0000000000680000-0x0000000000682000-memory.dmp

              Filesize

              8KB