Analysis

  • max time kernel
    95s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:34

General

  • Target

    b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe

  • Size

    292KB

  • MD5

    be6ece1b6510c986870d8ceabb87988b

  • SHA1

    63795ce8b9c7fd5ec3374e3e012b3898a8695f53

  • SHA256

    b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f

  • SHA512

    c7296be4cf5c14ada776312ceeedd29b52b6e4e228e6f1453e5485571099f6c517e90c6f33b88835b51130056bca6d2401d1bd6aed7e0b9d590d3b7b2c60a334

  • SSDEEP

    6144:oweQYmMhY6ydhGhzXu2UDOyDSWwDrW12P4v2B/Bd66R6DWV:6QYNILOzWwDrWsg2JBxR6DWV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe
    "C:\Users\Admin\AppData\Local\Temp\b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:212
    • C:\Users\Admin\AppData\Local\Temp\cznfe.exe
      C:\Users\Admin\AppData\Local\Temp\cznfe.exe C:\Users\Admin\AppData\Local\Temp\tostc
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4492
      • C:\Users\Admin\AppData\Local\Temp\cznfe.exe
        C:\Users\Admin\AppData\Local\Temp\cznfe.exe C:\Users\Admin\AppData\Local\Temp\tostc
        3⤵
          PID:1684
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 520
          3⤵
          • Program crash
          PID:2392
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4492 -ip 4492
      1⤵
        PID:2076

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\3tmmjx84hcpzeac8q

        Filesize

        210KB

        MD5

        c991010927a0003b352fe645f53122da

        SHA1

        282c97fcd98de42ffad1879d51f62e711fb2d0d2

        SHA256

        05201a873aaed950ff031f861daf6fcd1bc23345458fa9152b9486731ddbfca9

        SHA512

        c0f6c9e121f81c95164326f36c2f5e587b5b1d30801400bafcb39f98fa0274ccdf0a0d3f888053f0929a7998850384fb0910924a82c83ce949893c5743cf7008

      • C:\Users\Admin\AppData\Local\Temp\cznfe.exe

        Filesize

        120KB

        MD5

        3464aade4cb916d733fdd606c3d70165

        SHA1

        0c47d2c2d6a12cb78275f0d9b3190b1aad04805b

        SHA256

        a1b617196797fb690647c6f4f0329be8087bdaf222bdbe8bcd762ebb619e5ad2

        SHA512

        a4c01810521414aa8ca7757fae35f8710f37d109360d240483063dd22db3e94e32cf9819022e4e1d7b3ee7845fa635bd9417645beb99b400bf3f8e93cafbfbeb

      • C:\Users\Admin\AppData\Local\Temp\tostc

        Filesize

        4KB

        MD5

        9a6b34eb6752b9ece6f47081f02565c4

        SHA1

        b7a73450048bbcde6953886f3d7b177e2434ea0d

        SHA256

        274d7ddab57e4caf3fca959b4b5c8a2842fe68196593f0aa7453855cf9e20242

        SHA512

        edc1baf7792d8e88a61d397173fb84e5e3f36cf738020a6e8557462c6def570c541e371cd289ff4f0704d08697aa01476aad8bcfc8e7e11c5fa0b1d8602efe2a

      • memory/4492-8-0x0000000000B30000-0x0000000000B32000-memory.dmp

        Filesize

        8KB