Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:41
Static task
static1
Behavioral task
behavioral1
Sample
PO3118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
PO3118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/cvve2p5h0gqmdd.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/cvve2p5h0gqmdd.dll
Resource
win10v2004-20241007-en
General
-
Target
PO3118.exe
-
Size
393KB
-
MD5
7472bc65871e7bef7264c09fcc028e4f
-
SHA1
c0420262972a81c2332f83a0736f48ce500dc2b6
-
SHA256
d6ddafd9aa4fbe03e73aa4f1b4854d83503eb4fe9b91dd6f3ac44a030847c2d7
-
SHA512
bd4c3397af0c66626ab5c35c95bb5dd74134ef348375cd338a1013c8b1c9ccf8fe936f23874153cb32145c55c01ac660d0db293e0d7451eacc907540eb9accdf
-
SSDEEP
6144:id/ztr1lc8xB6SSQ8mst8hTM+713eGlaUlBfqcOvCom2K9ItlkEvmrVuy5A:WvlcWBe/WRiJHmYtlPaVuyC
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1720 PO3118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4384 1720 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO3118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1720 wrote to memory of 3068 1720 PO3118.exe 82 PID 1720 wrote to memory of 3068 1720 PO3118.exe 82 PID 1720 wrote to memory of 3068 1720 PO3118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO3118.exe"C:\Users\Admin\AppData\Local\Temp\PO3118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\PO3118.exe"C:\Users\Admin\AppData\Local\Temp\PO3118.exe"2⤵PID:3068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 9162⤵
- Program crash
PID:4384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1720 -ip 17201⤵PID:4508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD57dca75191f506b4a9dac4683211aafc0
SHA1c31b50e4d74aae90730d308d70e166c6c031ec54
SHA25628b2482383978cb373546a80213c9c6d03e4af09f2399e5b8d115811f822200e
SHA512382d43c225cc815a796be1a66f111dd396ce8921fb424d92987cd3055850272f597d5eee4d84ae1b888577833e134b296934a37a26c882d04f520462d99aaa74