Analysis
-
max time kernel
431s -
max time network
1158s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
26-11-2024 00:56
General
-
Target
P.exe
-
Size
7.9MB
-
MD5
e79c4dbed06bcf976e1b83e783841180
-
SHA1
82a652f3d1878a19e93b7b68c385dd098791143f
-
SHA256
7c9a81cf8ddab94b4387e5e353b465ab5e02cc70fe89b797a4e5cd5523bae8dd
-
SHA512
2150cc60ba4bae4e01465c8463bf433f0b3bf6af5e3a9b0928e72556ab58b3c0c98b63991c56dc09e0040777d98742db70aa2a305bc4d7674a9fff42801bb50a
-
SSDEEP
196608:xZL0l5lLCjNNjsoKUeC+cxw191+lzDrBVB8YXf4mjGH:xZL0l5ZCzsJpVWlTBVBT4mjGH
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/5000-0-0x0000000000620000-0x0000000001DC8000-memory.dmp upx behavioral1/memory/5000-2-0x0000000000620000-0x0000000001DC8000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1128 5000 WerFault.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
P.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P.exe -
Modifies registry class 7 IoCs
Processes:
P.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000_Classes\psiphon P.exe Set value (str) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000_Classes\psiphon\ = "URL:psiphon" P.exe Set value (str) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000_Classes\psiphon\URL Protocol P.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000_Classes\psiphon\shell\open\command P.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000_Classes\psiphon\shell P.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000_Classes\psiphon\shell\open P.exe Set value (str) \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000_Classes\psiphon\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\P.exe\" -- \"%1\"" P.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
P.exepid Process 5000 P.exe 5000 P.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\P.exe"C:\Users\Admin\AppData\Local\Temp\P.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 16882⤵
- Program crash
PID:1128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5000 -ip 50001⤵PID:3244