Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2024, 06:56 UTC

General

  • Target

    8c6a3b280f110c323cfaa281569c10755705e352d6d08d00b995f157a39e4934.exe

  • Size

    239KB

  • MD5

    e3cbe8ea9279c7fcc65d16e18afaecb8

  • SHA1

    631e52038eca8370d2735984b0a33c63204f16f3

  • SHA256

    8c6a3b280f110c323cfaa281569c10755705e352d6d08d00b995f157a39e4934

  • SHA512

    5450ebea8f7616d83436bbb3e6b011ae5ec04ef612446c60a0bb8b382e06e6f68aa8fc82e71186f7254838c3d17ea57749e928031dbd8341e56c1d45e0952659

  • SSDEEP

    6144:wBlL/cFI0xVSUClW8kjglzyrtsdVGMBGOdmrhWTvTlKixQW:CefzSzWrjIzyrgVBNohEvTlK4p

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c6a3b280f110c323cfaa281569c10755705e352d6d08d00b995f157a39e4934.exe
    "C:\Users\Admin\AppData\Local\Temp\8c6a3b280f110c323cfaa281569c10755705e352d6d08d00b995f157a39e4934.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3084
    • C:\Users\Admin\AppData\Local\Temp\8c6a3b280f110c323cfaa281569c10755705e352d6d08d00b995f157a39e4934.exe
      "C:\Users\Admin\AppData\Local\Temp\8c6a3b280f110c323cfaa281569c10755705e352d6d08d00b995f157a39e4934.exe"
      2⤵
        PID:4728
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 1052
        2⤵
        • Program crash
        PID:3940
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3084 -ip 3084
      1⤵
        PID:4396

      Network

      • flag-us
        DNS
        8.8.8.8.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        8.8.8.8.in-addr.arpa
        IN PTR
        Response
        8.8.8.8.in-addr.arpa
        IN PTR
        dnsgoogle
      • flag-us
        DNS
        217.106.137.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        217.106.137.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        172.214.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.214.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        73.159.190.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        73.159.190.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        232.168.11.51.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        232.168.11.51.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        212.20.149.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        212.20.149.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        241.42.69.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        241.42.69.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        82.190.18.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        82.190.18.2.in-addr.arpa
        IN PTR
        Response
        82.190.18.2.in-addr.arpa
        IN PTR
        a2-18-190-82deploystaticakamaitechnologiescom
      • flag-us
        DNS
        200.254.1.23.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        200.254.1.23.in-addr.arpa
        IN PTR
        Response
        200.254.1.23.in-addr.arpa
        IN PTR
        a23-1-254-200deploystaticakamaitechnologiescom
      • flag-us
        DNS
        29.243.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        29.243.111.52.in-addr.arpa
        IN PTR
        Response
      No results found
      • 8.8.8.8:53
        8.8.8.8.in-addr.arpa
        dns
        66 B
        90 B
        1
        1

        DNS Request

        8.8.8.8.in-addr.arpa

      • 8.8.8.8:53
        217.106.137.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        217.106.137.52.in-addr.arpa

      • 8.8.8.8:53
        172.214.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.214.232.199.in-addr.arpa

      • 8.8.8.8:53
        73.159.190.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        73.159.190.20.in-addr.arpa

      • 8.8.8.8:53
        95.221.229.192.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        95.221.229.192.in-addr.arpa

      • 8.8.8.8:53
        232.168.11.51.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        232.168.11.51.in-addr.arpa

      • 8.8.8.8:53
        212.20.149.52.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        212.20.149.52.in-addr.arpa

      • 8.8.8.8:53
        241.42.69.40.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        241.42.69.40.in-addr.arpa

      • 8.8.8.8:53
        82.190.18.2.in-addr.arpa
        dns
        70 B
        133 B
        1
        1

        DNS Request

        82.190.18.2.in-addr.arpa

      • 8.8.8.8:53
        200.254.1.23.in-addr.arpa
        dns
        71 B
        135 B
        1
        1

        DNS Request

        200.254.1.23.in-addr.arpa

      • 8.8.8.8:53
        29.243.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        29.243.111.52.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\nsu8483.tmp\mjqhvtbt.dll

        Filesize

        20KB

        MD5

        1a9611c5ff84796e5f45f376fda7e9e6

        SHA1

        aae18ef74846e00aa86afd85cd05a6c9b1ce74f7

        SHA256

        2843909e5427e33eeb2e5bee514511af65c37058b2b3776de91a4ce305a21763

        SHA512

        3fafd65ecd1360ed8e990bf17332f0d9a3842c95d2cc9d697d943be90da4d0aa273e9693c33aec77f207c8512c74f29bb5e36ac693e35ffd1070072e7b27fd3e

      • memory/3084-7-0x0000000074AD5000-0x0000000074AD7000-memory.dmp

        Filesize

        8KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.