Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:38
Static task
static1
Behavioral task
behavioral1
Sample
8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
wyzjr.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
wyzjr.exe
Resource
win10v2004-20241007-en
General
-
Target
8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe
-
Size
243KB
-
MD5
4bf4450020724b27517cddead279c4ed
-
SHA1
4ced998f7bc61731e9278a40465ca56da64fbcc5
-
SHA256
8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06
-
SHA512
3a816c892d8a3d43a573e377081bec8e12ef7e2a3ba0a63302be6da15d583cbfeb649723b44eeb944d9245850c465cd1cec884b91d44573c9743cd9cd4186796
-
SSDEEP
3072:rS17XJiDxmJJ9VTgr23+Jhif76pfXRu4iDKEKD3b+lNx52hLHAnwCFcj7USifb4u:rGiPqdOd04l4lZ2lHxj7ZtJmIyO0Mmie
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4572 wyzjr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2960 4572 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wyzjr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4512 wrote to memory of 4572 4512 8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe 82 PID 4512 wrote to memory of 4572 4512 8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe 82 PID 4512 wrote to memory of 4572 4512 8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe 82 PID 4572 wrote to memory of 1524 4572 wyzjr.exe 83 PID 4572 wrote to memory of 1524 4572 wyzjr.exe 83 PID 4572 wrote to memory of 1524 4572 wyzjr.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe"C:\Users\Admin\AppData\Local\Temp\8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\wyzjr.exeC:\Users\Admin\AppData\Local\Temp\wyzjr.exe C:\Users\Admin\AppData\Local\Temp\izjwkhiz2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\wyzjr.exeC:\Users\Admin\AppData\Local\Temp\wyzjr.exe C:\Users\Admin\AppData\Local\Temp\izjwkhiz3⤵PID:1524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 5883⤵
- Program crash
PID:2960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4572 -ip 45721⤵PID:4188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5c41cc022a5b5e72d4e182de9d458a763
SHA15f92d10f77512c6b5efb80f005306bbe533c9612
SHA256bc0b3df83d1ae598d17ca9adf8a70ee3de8f9f0bc1ecf87786994277d441447f
SHA512ff66adfac66965ed5a9b7dbe999b20a9bc7d3e190d59fbbb988578557467de72bc3a834b2be42652f9fdb643709b8e9e6bf9b0d8f651be22e9408684f6703f3a
-
Filesize
4KB
MD51a5ec202f8169810c65c8a217e04652c
SHA18f3515de3ffbd19e5410632243cdd2c7111346df
SHA256d8e511d26414c679bb7386e511a2847f627a431d33cd91f6f7860fc7d6cda704
SHA51298a1172857e64e967c396492baad7bd65b7175c7631e854b756c2a7fe046406a700d91f0b6075e95c74ddaa76631bc2436797b16dd1f637a0279b13ef1187061
-
Filesize
212KB
MD52c86fd5b82613a4bb25162eece241874
SHA199440aad85aede39e9b2ade66b82fbd02575ab5b
SHA256eefd122c8453d86bf99cd79cce877644596446126c2d27b1bb18b8f33e762e74
SHA5124915eaf6cf72c4ceb9e799a82094290fbbe15ec04ee07c6c1aeb9af62db16c595ce432626c18a93c56557a1f75929d1b607e1c64b36e118931d5a3ce0bb9a9e2