Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
cznfe.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
cznfe.exe
Resource
win10v2004-20241007-en
General
-
Target
b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe
-
Size
292KB
-
MD5
be6ece1b6510c986870d8ceabb87988b
-
SHA1
63795ce8b9c7fd5ec3374e3e012b3898a8695f53
-
SHA256
b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f
-
SHA512
c7296be4cf5c14ada776312ceeedd29b52b6e4e228e6f1453e5485571099f6c517e90c6f33b88835b51130056bca6d2401d1bd6aed7e0b9d590d3b7b2c60a334
-
SSDEEP
6144:oweQYmMhY6ydhGhzXu2UDOyDSWwDrW12P4v2B/Bd66R6DWV:6QYNILOzWwDrWsg2JBxR6DWV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4492 cznfe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2392 4492 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cznfe.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 212 wrote to memory of 4492 212 b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe 82 PID 212 wrote to memory of 4492 212 b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe 82 PID 212 wrote to memory of 4492 212 b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe 82 PID 4492 wrote to memory of 1684 4492 cznfe.exe 83 PID 4492 wrote to memory of 1684 4492 cznfe.exe 83 PID 4492 wrote to memory of 1684 4492 cznfe.exe 83 PID 4492 wrote to memory of 1684 4492 cznfe.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe"C:\Users\Admin\AppData\Local\Temp\b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\cznfe.exeC:\Users\Admin\AppData\Local\Temp\cznfe.exe C:\Users\Admin\AppData\Local\Temp\tostc2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\cznfe.exeC:\Users\Admin\AppData\Local\Temp\cznfe.exe C:\Users\Admin\AppData\Local\Temp\tostc3⤵PID:1684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 5203⤵
- Program crash
PID:2392
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4492 -ip 44921⤵PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5c991010927a0003b352fe645f53122da
SHA1282c97fcd98de42ffad1879d51f62e711fb2d0d2
SHA25605201a873aaed950ff031f861daf6fcd1bc23345458fa9152b9486731ddbfca9
SHA512c0f6c9e121f81c95164326f36c2f5e587b5b1d30801400bafcb39f98fa0274ccdf0a0d3f888053f0929a7998850384fb0910924a82c83ce949893c5743cf7008
-
Filesize
120KB
MD53464aade4cb916d733fdd606c3d70165
SHA10c47d2c2d6a12cb78275f0d9b3190b1aad04805b
SHA256a1b617196797fb690647c6f4f0329be8087bdaf222bdbe8bcd762ebb619e5ad2
SHA512a4c01810521414aa8ca7757fae35f8710f37d109360d240483063dd22db3e94e32cf9819022e4e1d7b3ee7845fa635bd9417645beb99b400bf3f8e93cafbfbeb
-
Filesize
4KB
MD59a6b34eb6752b9ece6f47081f02565c4
SHA1b7a73450048bbcde6953886f3d7b177e2434ea0d
SHA256274d7ddab57e4caf3fca959b4b5c8a2842fe68196593f0aa7453855cf9e20242
SHA512edc1baf7792d8e88a61d397173fb84e5e3f36cf738020a6e8557462c6def570c541e371cd289ff4f0704d08697aa01476aad8bcfc8e7e11c5fa0b1d8602efe2a