Analysis
-
max time kernel
94s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 19:02
Static task
static1
Behavioral task
behavioral1
Sample
f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe
Resource
win10v2004-20241007-en
General
-
Target
f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe
-
Size
699KB
-
MD5
c684a63e08404601807c7bd5af233d28
-
SHA1
d9607463fcf1ce55eb8e5649b65047ee526d8060
-
SHA256
f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621
-
SHA512
ffd030b446965e404fd7b76bf2839a9dd620b4c1ded7e82c6b02f277219514de0489059617bc2ca5b560c767b401630d0b2d34ec056df514771a563a8e0f46cd
-
SSDEEP
12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLxwxhzZ:ffmMv6Ckr7Mny5QLxwxhV
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\starbowlines.vbs starbowlines.exe -
Executes dropped EXE 1 IoCs
pid Process 2752 starbowlines.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c79-13.dat autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3272 2752 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language starbowlines.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2752 1244 f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe 83 PID 1244 wrote to memory of 2752 1244 f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe 83 PID 1244 wrote to memory of 2752 1244 f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe 83 PID 2752 wrote to memory of 4396 2752 starbowlines.exe 84 PID 2752 wrote to memory of 4396 2752 starbowlines.exe 84 PID 2752 wrote to memory of 4396 2752 starbowlines.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe"C:\Users\Admin\AppData\Local\Temp\f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\anaboly\starbowlines.exe"C:\Users\Admin\AppData\Local\Temp\f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe"3⤵PID:4396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 7443⤵
- Program crash
PID:3272
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 2752 -ip 27521⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5d15f30aadcae7f87307e63e039228866
SHA161d3595411a9a2ff483a5e1b5a359ca7868d1f5a
SHA25625ae69f8d71da3dbcde420c9a0abf90bbce046c27969580b2a37e289ce9b6205
SHA51225e6801408e24b6c5a2472ed7218ff9a7e272b2b1747a9c2a7eb7ed40223649589daac713c08fe8015df89b5d0da176188345edcfbd0ef56e3a4151b12467fa0
-
Filesize
29KB
MD5a2a9ce81977085a400789d49db0f0250
SHA13ebe1a79d42e3bda77030fa6b26740bd7a287691
SHA2564a3071b8298eb6dbc10141a491909fa7c726d68bc5721581587b09797e16bc58
SHA5120919addf21283224eb83353d7f7a3e8ff62047699ab97bb3ac57a0aafe51e397465ef1be30808ff20b6b5e8a12a5a2000dfa76db6557b3f258bfc7c1c59082dc
-
Filesize
699KB
MD5c684a63e08404601807c7bd5af233d28
SHA1d9607463fcf1ce55eb8e5649b65047ee526d8060
SHA256f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621
SHA512ffd030b446965e404fd7b76bf2839a9dd620b4c1ded7e82c6b02f277219514de0489059617bc2ca5b560c767b401630d0b2d34ec056df514771a563a8e0f46cd