Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 12:11

General

  • Target

    06b141da308fca09fab26963c3bb1ae851cf941b9dcfa269c5c640ef28f55fd7.exe

  • Size

    239KB

  • MD5

    e697f9c6fe6143fe464019a1bceebd97

  • SHA1

    2273f347360a05ab7b136086ac1643f3f20487ec

  • SHA256

    06b141da308fca09fab26963c3bb1ae851cf941b9dcfa269c5c640ef28f55fd7

  • SHA512

    9f6439c167ef0d7119614d80173bbe3c21c84d2509eaebb73ac3df5ac67ab56d5efc17296c870925007f9a2b3b9d34ec27badf4e7686d4ddd2665d7eee94dba7

  • SSDEEP

    6144:wBlL/cHco/HkHqs7IPcKbQMMz8vPMLFGZ:CeHcKsCcaMpFc

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06b141da308fca09fab26963c3bb1ae851cf941b9dcfa269c5c640ef28f55fd7.exe
    "C:\Users\Admin\AppData\Local\Temp\06b141da308fca09fab26963c3bb1ae851cf941b9dcfa269c5c640ef28f55fd7.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\06b141da308fca09fab26963c3bb1ae851cf941b9dcfa269c5c640ef28f55fd7.exe
      "C:\Users\Admin\AppData\Local\Temp\06b141da308fca09fab26963c3bb1ae851cf941b9dcfa269c5c640ef28f55fd7.exe"
      2⤵
        PID:2764
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 972
        2⤵
        • Program crash
        PID:4480
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2076 -ip 2076
      1⤵
        PID:1140

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\nsn9982.tmp\lfpnfont.dll

        Filesize

        20KB

        MD5

        fa424f9b0c98afafb0671959f35139fb

        SHA1

        25f5c5139e5248c85f122eb42cdafc2d974d507a

        SHA256

        969d24cf93578bfd20c823ef79580dd61e007b00023fad94238e3e2e4bd5a479

        SHA512

        9176814ef19f8a1da11007b6d9c264308fae22905401f383bf516507bd6e210164644d588be177ea5c04667eeae520abfb4a0646a084f480c99bc433445f03e1

      • memory/2076-7-0x0000000074555000-0x0000000074557000-memory.dmp

        Filesize

        8KB