Analysis
-
max time kernel
92s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
Invoice NO 22073895.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Invoice NO 22073895.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
pvwuec.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
pvwuec.exe
Resource
win10v2004-20241007-en
General
-
Target
Invoice NO 22073895.exe
-
Size
486KB
-
MD5
85cd688a9fee95b88b94b6879039201f
-
SHA1
0843488b993fd26651cff415ac5a43c593defa25
-
SHA256
4d3261b30e45d9577916b421a9b829836e955a9be539866aa29d21aad01283c1
-
SHA512
9ed65a00f4e6c276b18778feac6140759ebbc159d15c4c20280ff13b1887c73ec4fc88a38abe0f8e0d75ec0e5a5acf82478472b761247bee1357d130bf80ab45
-
SSDEEP
12288:AYn68Ex+E5Z8kJqeKPMwwOfGo5KNfhtDuCytMi4zaaKL:AYn6DAEgIqecuo5KbsCy6igbG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4544 pvwuec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 64 4544 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Invoice NO 22073895.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvwuec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4424 wrote to memory of 4544 4424 Invoice NO 22073895.exe 83 PID 4424 wrote to memory of 4544 4424 Invoice NO 22073895.exe 83 PID 4424 wrote to memory of 4544 4424 Invoice NO 22073895.exe 83 PID 4544 wrote to memory of 4964 4544 pvwuec.exe 84 PID 4544 wrote to memory of 4964 4544 pvwuec.exe 84 PID 4544 wrote to memory of 4964 4544 pvwuec.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Invoice NO 22073895.exe"C:\Users\Admin\AppData\Local\Temp\Invoice NO 22073895.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\pvwuec.exe"C:\Users\Admin\AppData\Local\Temp\pvwuec.exe" C:\Users\Admin\AppData\Local\Temp\eeelcb.fn2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\pvwuec.exe"C:\Users\Admin\AppData\Local\Temp\pvwuec.exe"3⤵PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 5323⤵
- Program crash
PID:64
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4544 -ip 45441⤵PID:2320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5c4ee853696ad5db212cd6ae2bb8a0fe1
SHA1840ccd25c091a082be426b35386ce7ab8f5d0631
SHA2566c92c5b0c148c513174215823f3ba3f7f53adbaae077553219826b35553edba1
SHA5127527d4792d58829f38ed4509a37cc248a02aaeeddf747d3afe3c3f380f8fdad0ebe39e9c989bf1d224f54fab0d187379a93eb9a61800fd7d1f52eb4e6ec9e8c3
-
Filesize
84KB
MD5e87c6c672ec024582ffb00811abf747e
SHA105921c941ed33b6e0e4cd35c20a452d0659d04dd
SHA25617a23dd9b5a1b36f5db90ea4e102a03a8dd14557b60f4c19c17e62e53ac19f86
SHA5125d09656b375b7cb2a3e3062e4a4af3c77663cc454e79a7be59f2996b4db54e8609f6de7b0ad27432e42b45f2e544a22ba43096b61be6d06d36ff1b20b1e49cb5
-
Filesize
196KB
MD5f33a9bba9a07130a2662f4f14e696e7c
SHA16fd979cbec5aaa33f8276ca0825a8c0e71768499
SHA256ea5fe369ca49d659b7cf129def53fd7a1589c9ccdf16a7270354897e885d730c
SHA5128df1c084b2dcf922faa9ae404642ab9e417b50bdafbf88ce14f1df1d3c3894d7e2f23e5e83ac4362edec3aa0d5a898af9087dac3680731a8dc8960a43b33cdfb