Analysis
-
max time kernel
95s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:45
Behavioral task
behavioral1
Sample
OR81530S.exe
Resource
win7-20240903-en
General
-
Target
OR81530S.exe
-
Size
636KB
-
MD5
af331c3c0907af5282c00443536b22c7
-
SHA1
ed908b4ad857a61bc9aa84bf8d53df894ee7bd5d
-
SHA256
1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff
-
SHA512
f00f1eb4df01061dd1bfec6c6df3e509359aa4a5acea5c91f5b9cd41e4bbf218d46a43b25d00922f86d1bbe99d090622e042cea1ce2184bd75d6f47b14fc7423
-
SSDEEP
12288:jXe9PPlowWX0t6mOQwg1Qd15CcYk0We11Z6SBlWJ1bGo+QTIXZ0+PBBVb:KhloDX0XOf4NARGojTIXu+PzVb
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/460-10-0x0000000000400000-0x000000000056E000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/460-0-0x0000000000400000-0x000000000056E000-memory.dmp upx behavioral2/memory/460-10-0x0000000000400000-0x000000000056E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4552 460 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OR81530S.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 460 wrote to memory of 3384 460 OR81530S.exe 83 PID 460 wrote to memory of 3384 460 OR81530S.exe 83 PID 460 wrote to memory of 3384 460 OR81530S.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\OR81530S.exe"C:\Users\Admin\AppData\Local\Temp\OR81530S.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\OR81530S.exe"C:\Users\Admin\AppData\Local\Temp\OR81530S.exe"2⤵PID:3384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 8042⤵
- Program crash
PID:4552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 460 -ip 4601⤵PID:392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218KB
MD57bbe7664b37c3d0d4eb86fb34ade9451
SHA16ac547e955d855cf50d57a26965b852e13d5f5b7
SHA256c9fc8e1d526c38349b26662d820394fdbc7ca4dc928aa96589a92832402b52b7
SHA512c2e4ee3d006a9bc78ea345e19504bc21f3db9877523722a494c8954351f5cf8c927a4ace8fd3f218761e327532f951bdcef48236023f00d015670218bee9f630