Analysis

  • max time kernel
    93s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:38

General

  • Target

    8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe

  • Size

    243KB

  • MD5

    4bf4450020724b27517cddead279c4ed

  • SHA1

    4ced998f7bc61731e9278a40465ca56da64fbcc5

  • SHA256

    8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06

  • SHA512

    3a816c892d8a3d43a573e377081bec8e12ef7e2a3ba0a63302be6da15d583cbfeb649723b44eeb944d9245850c465cd1cec884b91d44573c9743cd9cd4186796

  • SSDEEP

    3072:rS17XJiDxmJJ9VTgr23+Jhif76pfXRu4iDKEKD3b+lNx52hLHAnwCFcj7USifb4u:rGiPqdOd04l4lZ2lHxj7ZtJmIyO0Mmie

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe
    "C:\Users\Admin\AppData\Local\Temp\8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4512
    • C:\Users\Admin\AppData\Local\Temp\wyzjr.exe
      C:\Users\Admin\AppData\Local\Temp\wyzjr.exe C:\Users\Admin\AppData\Local\Temp\izjwkhiz
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4572
      • C:\Users\Admin\AppData\Local\Temp\wyzjr.exe
        C:\Users\Admin\AppData\Local\Temp\wyzjr.exe C:\Users\Admin\AppData\Local\Temp\izjwkhiz
        3⤵
          PID:1524
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 588
          3⤵
          • Program crash
          PID:2960
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4572 -ip 4572
      1⤵
        PID:4188

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\izjwkhiz

        Filesize

        5KB

        MD5

        c41cc022a5b5e72d4e182de9d458a763

        SHA1

        5f92d10f77512c6b5efb80f005306bbe533c9612

        SHA256

        bc0b3df83d1ae598d17ca9adf8a70ee3de8f9f0bc1ecf87786994277d441447f

        SHA512

        ff66adfac66965ed5a9b7dbe999b20a9bc7d3e190d59fbbb988578557467de72bc3a834b2be42652f9fdb643709b8e9e6bf9b0d8f651be22e9408684f6703f3a

      • C:\Users\Admin\AppData\Local\Temp\wyzjr.exe

        Filesize

        4KB

        MD5

        1a5ec202f8169810c65c8a217e04652c

        SHA1

        8f3515de3ffbd19e5410632243cdd2c7111346df

        SHA256

        d8e511d26414c679bb7386e511a2847f627a431d33cd91f6f7860fc7d6cda704

        SHA512

        98a1172857e64e967c396492baad7bd65b7175c7631e854b756c2a7fe046406a700d91f0b6075e95c74ddaa76631bc2436797b16dd1f637a0279b13ef1187061

      • C:\Users\Admin\AppData\Local\Temp\x1rwpv2bzxwpsa1

        Filesize

        212KB

        MD5

        2c86fd5b82613a4bb25162eece241874

        SHA1

        99440aad85aede39e9b2ade66b82fbd02575ab5b

        SHA256

        eefd122c8453d86bf99cd79cce877644596446126c2d27b1bb18b8f33e762e74

        SHA512

        4915eaf6cf72c4ceb9e799a82094290fbbe15ec04ee07c6c1aeb9af62db16c595ce432626c18a93c56557a1f75929d1b607e1c64b36e118931d5a3ce0bb9a9e2

      • memory/4572-7-0x0000000000880000-0x0000000000882000-memory.dmp

        Filesize

        8KB