Analysis
-
max time kernel
94s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 07:14
Static task
static1
Behavioral task
behavioral1
Sample
6f4b9a86ae77415b5497874919ddf6d1.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
6f4b9a86ae77415b5497874919ddf6d1.exe
Resource
win10v2004-20241007-en
General
-
Target
6f4b9a86ae77415b5497874919ddf6d1.exe
-
Size
1.9MB
-
MD5
6f4b9a86ae77415b5497874919ddf6d1
-
SHA1
1986f8eb59766fca81c04ee26ce36e6f0aca0a99
-
SHA256
a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8
-
SHA512
8b818fd1531b45a47571dfebdc8730114bbad58ec6db64f81591ee78ea84eee0c07074c38475c994a44b36324b3f22fc3de201e4dc4bfb39019e2700c7c02ba2
-
SSDEEP
49152:FVg5tQ7aWpVDYcHDNYiOE/rvSt7Ch+aodoHwGgQG5:rg56Zhj+iO8SB3DbQ
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
dews.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dews.vbs dews.exe -
Executes dropped EXE 5 IoCs
Processes:
dews.exedews.exedews.exedews.exedews.exepid Process 4152 dews.exe 3820 dews.exe 220 dews.exe 1152 dews.exe 2148 dews.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x000b000000023b66-9.dat autoit_exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1112 2148 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dews.exedews.exedews.exedews.exe6f4b9a86ae77415b5497874919ddf6d1.exedews.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dews.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dews.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dews.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dews.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f4b9a86ae77415b5497874919ddf6d1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dews.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
dews.exedews.exedews.exedews.exepid Process 4152 dews.exe 3820 dews.exe 220 dews.exe 1152 dews.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
6f4b9a86ae77415b5497874919ddf6d1.exedews.exedews.exedews.exedews.exedews.exedescription pid Process procid_target PID 4376 wrote to memory of 4152 4376 6f4b9a86ae77415b5497874919ddf6d1.exe 82 PID 4376 wrote to memory of 4152 4376 6f4b9a86ae77415b5497874919ddf6d1.exe 82 PID 4376 wrote to memory of 4152 4376 6f4b9a86ae77415b5497874919ddf6d1.exe 82 PID 4152 wrote to memory of 1220 4152 dews.exe 85 PID 4152 wrote to memory of 1220 4152 dews.exe 85 PID 4152 wrote to memory of 1220 4152 dews.exe 85 PID 4152 wrote to memory of 3820 4152 dews.exe 86 PID 4152 wrote to memory of 3820 4152 dews.exe 86 PID 4152 wrote to memory of 3820 4152 dews.exe 86 PID 3820 wrote to memory of 1836 3820 dews.exe 89 PID 3820 wrote to memory of 1836 3820 dews.exe 89 PID 3820 wrote to memory of 1836 3820 dews.exe 89 PID 3820 wrote to memory of 220 3820 dews.exe 90 PID 3820 wrote to memory of 220 3820 dews.exe 90 PID 3820 wrote to memory of 220 3820 dews.exe 90 PID 220 wrote to memory of 3340 220 dews.exe 91 PID 220 wrote to memory of 3340 220 dews.exe 91 PID 220 wrote to memory of 3340 220 dews.exe 91 PID 220 wrote to memory of 1152 220 dews.exe 92 PID 220 wrote to memory of 1152 220 dews.exe 92 PID 220 wrote to memory of 1152 220 dews.exe 92 PID 1152 wrote to memory of 5072 1152 dews.exe 93 PID 1152 wrote to memory of 5072 1152 dews.exe 93 PID 1152 wrote to memory of 5072 1152 dews.exe 93 PID 1152 wrote to memory of 2148 1152 dews.exe 94 PID 1152 wrote to memory of 2148 1152 dews.exe 94 PID 1152 wrote to memory of 2148 1152 dews.exe 94 PID 2148 wrote to memory of 3012 2148 dews.exe 96 PID 2148 wrote to memory of 3012 2148 dews.exe 96 PID 2148 wrote to memory of 3012 2148 dews.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f4b9a86ae77415b5497874919ddf6d1.exe"C:\Users\Admin\AppData\Local\Temp\6f4b9a86ae77415b5497874919ddf6d1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\overrough\dews.exe"C:\Users\Admin\AppData\Local\Temp\6f4b9a86ae77415b5497874919ddf6d1.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\6f4b9a86ae77415b5497874919ddf6d1.exe"3⤵PID:1220
-
-
C:\Users\Admin\AppData\Local\overrough\dews.exe"C:\Users\Admin\AppData\Local\overrough\dews.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\overrough\dews.exe"4⤵PID:1836
-
-
C:\Users\Admin\AppData\Local\overrough\dews.exe"C:\Users\Admin\AppData\Local\overrough\dews.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\overrough\dews.exe"5⤵PID:3340
-
-
C:\Users\Admin\AppData\Local\overrough\dews.exe"C:\Users\Admin\AppData\Local\overrough\dews.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\overrough\dews.exe"6⤵PID:5072
-
-
C:\Users\Admin\AppData\Local\overrough\dews.exe"C:\Users\Admin\AppData\Local\overrough\dews.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\overrough\dews.exe"7⤵PID:3012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 6807⤵
- Program crash
PID:1112
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2148 -ip 21481⤵PID:1756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1.5MB
MD56272d30810ec70134f39538df7ae164f
SHA198319a8bb87d499e8af11fd85b9c91997b71907a
SHA2569d8807a7c8c7f7ffc8d2c01fb220c5614ac411c3a26d31f756def18b994548f0
SHA5120dcf872b19326301b28a703fcacad1badee72868abb12052d9864bd94b1ed7da846c91f0bdb88e2d3886e03de6fe61e89bf9f09c219ab6531a7151fa2468e0d8
-
Filesize
1.0MB
MD52365e8fb4616f4f7ac333b863f6ac2d8
SHA1f15f8a5c8e4be48cf67e8db5bb5c3e2c7a4e1cfa
SHA256cae943691c4ada9210d656b3bee20f07758c9a1f0ff21f5f4da5bfab8f773a55
SHA51271ca1cb4c98401e06533c975607d0c896ade6424bd97c6f7b59a363df65b86fb0e3de81ddb928e48dddbdb28d95310ebf201bd1a365c733effdcb180e6dbeb20
-
Filesize
1.9MB
MD56f4b9a86ae77415b5497874919ddf6d1
SHA11986f8eb59766fca81c04ee26ce36e6f0aca0a99
SHA256a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8
SHA5128b818fd1531b45a47571dfebdc8730114bbad58ec6db64f81591ee78ea84eee0c07074c38475c994a44b36324b3f22fc3de201e4dc4bfb39019e2700c7c02ba2