Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 02:49
Static task
static1
Behavioral task
behavioral1
Sample
a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8.exe
Resource
win10v2004-20241007-en
General
-
Target
a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8.exe
-
Size
1.9MB
-
MD5
6f4b9a86ae77415b5497874919ddf6d1
-
SHA1
1986f8eb59766fca81c04ee26ce36e6f0aca0a99
-
SHA256
a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8
-
SHA512
8b818fd1531b45a47571dfebdc8730114bbad58ec6db64f81591ee78ea84eee0c07074c38475c994a44b36324b3f22fc3de201e4dc4bfb39019e2700c7c02ba2
-
SSDEEP
49152:FVg5tQ7aWpVDYcHDNYiOE/rvSt7Ch+aodoHwGgQG5:rg56Zhj+iO8SB3DbQ
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
dews.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dews.vbs dews.exe -
Executes dropped EXE 1 IoCs
Processes:
dews.exepid Process 4376 dews.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0008000000023cc4-9.dat autoit_exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 3964 4376 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8.exedews.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dews.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8.exedews.exedescription pid Process procid_target PID 1740 wrote to memory of 4376 1740 a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8.exe 82 PID 1740 wrote to memory of 4376 1740 a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8.exe 82 PID 1740 wrote to memory of 4376 1740 a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8.exe 82 PID 4376 wrote to memory of 4872 4376 dews.exe 85 PID 4376 wrote to memory of 4872 4376 dews.exe 85 PID 4376 wrote to memory of 4872 4376 dews.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8.exe"C:\Users\Admin\AppData\Local\Temp\a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\overrough\dews.exe"C:\Users\Admin\AppData\Local\Temp\a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8.exe"3⤵PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 7123⤵
- Program crash
PID:3964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4376 -ip 43761⤵PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD56272d30810ec70134f39538df7ae164f
SHA198319a8bb87d499e8af11fd85b9c91997b71907a
SHA2569d8807a7c8c7f7ffc8d2c01fb220c5614ac411c3a26d31f756def18b994548f0
SHA5120dcf872b19326301b28a703fcacad1badee72868abb12052d9864bd94b1ed7da846c91f0bdb88e2d3886e03de6fe61e89bf9f09c219ab6531a7151fa2468e0d8
-
Filesize
1.9MB
MD56f4b9a86ae77415b5497874919ddf6d1
SHA11986f8eb59766fca81c04ee26ce36e6f0aca0a99
SHA256a6efd2f90c60aa91d0066df9ec79d8a72d99e942d49c8e7327f82c58b86077a8
SHA5128b818fd1531b45a47571dfebdc8730114bbad58ec6db64f81591ee78ea84eee0c07074c38475c994a44b36324b3f22fc3de201e4dc4bfb39019e2700c7c02ba2