Analysis
-
max time kernel
93s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
DN 0098667.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DN 0098667.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/tktzsan.dll
Resource
win7-20240729-en
General
-
Target
DN 0098667.exe
-
Size
257KB
-
MD5
cbc03b03f2b8626ec8f8fbcf7382df94
-
SHA1
ac570be606cddbe2ff862555e0b28a368f84df9b
-
SHA256
c8bc547a806fa169df7de512393fa0955c262d808a84758c6fafd5b9f30c8193
-
SHA512
5f55afeea21db580d010663bd29bbf57767d5af804adb1b44c879ee4a4d473992efeacb7bf887e1f1ab703a6497f5384ea2c391f2e1653ceb59d3232a8fb9819
-
SSDEEP
6144:Z8LxBaMfdkQ+JncfjmSxaF58LjaYpf7xHDc/XYw3LpQgF9:NM9+JnSxNP7fHDc/X77Kgf
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1764 DN 0098667.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1580 1764 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DN 0098667.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1764 wrote to memory of 4532 1764 DN 0098667.exe 82 PID 1764 wrote to memory of 4532 1764 DN 0098667.exe 82 PID 1764 wrote to memory of 4532 1764 DN 0098667.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\DN 0098667.exe"C:\Users\Admin\AppData\Local\Temp\DN 0098667.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\DN 0098667.exe"C:\Users\Admin\AppData\Local\Temp\DN 0098667.exe"2⤵PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 10602⤵
- Program crash
PID:1580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1764 -ip 17641⤵PID:1612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD53d4fc93b0e82d14dc45f93d7c280faa9
SHA14e472ee4f91cd88b7fbc66e2d042bd84783dc889
SHA2564e177339740363323d54016a8b60a135a58d5c1593aa76115acc38e9c7eb10a8
SHA5121eeac5f1f8e87bab84b1048f25f387cebd74d253501ff54a4352074b907e0759ccaedc476013c65ceac4a5206c13b9db72c6d2b81451d4d694ac0eb5bca33e6d