Overview
overview
10Static
static
7d01c7369d4...8N.exe
windows7-x64
10d01c7369d4...8N.exe
windows10-2004-x64
10$PLUGINSDI...el.dll
windows7-x64
7$PLUGINSDI...el.dll
windows10-2004-x64
7$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$_57_/PowerRun64.exe
windows7-x64
4$_57_/PowerRun64.exe
windows10-2004-x64
3$_57_/SetACL64.exe
windows7-x64
1$_57_/SetACL64.exe
windows10-2004-x64
1$_57_/bn.bat
windows7-x64
1$_57_/bn.bat
windows10-2004-x64
1$_57_/bn1.bat
windows7-x64
10$_57_/bn1.bat
windows10-2004-x64
10$_57_/bnn.bat
windows7-x64
1$_57_/bnn.bat
windows10-2004-x64
1$_57_/bnz.bat
windows7-x64
1$_57_/bnz.bat
windows10-2004-x64
1$_57_/dotN...up.exe
windows7-x64
7$_57_/dotN...up.exe
windows10-2004-x64
7$_57_/dotN...up.exe
windows7-x64
7$_57_/dotN...up.exe
windows10-2004-x64
7$_57_/ucmigp.exe
windows7-x64
3$_57_/ucmigp.exe
windows10-2004-x64
3$_57_/win_...rp.exe
windows7-x64
3$_57_/win_...rp.exe
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 08:58
Behavioral task
behavioral1
Sample
d01c7369d4e4f521de836b03f80006aad05aa71d81eaf4402c55b4b9b50c5038N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d01c7369d4e4f521de836b03f80006aad05aa71d81eaf4402c55b4b9b50c5038N.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$_57_/PowerRun64.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
$_57_/PowerRun64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$_57_/SetACL64.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$_57_/SetACL64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$_57_/bn.bat
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$_57_/bn.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$_57_/bn1.bat
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$_57_/bn1.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$_57_/bnn.bat
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$_57_/bnn.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$_57_/bnz.bat
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$_57_/bnz.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$_57_/dotNetFx40_Full_setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$_57_/dotNetFx40_Full_setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$_57_/dotNetFx45_Full_setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
$_57_/dotNetFx45_Full_setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$_57_/ucmigp.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
$_57_/ucmigp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$_57_/win_version_csharp.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$_57_/win_version_csharp.exe
Resource
win10v2004-20241007-en
General
-
Target
$_57_/ucmigp.exe
-
Size
6KB
-
MD5
094249252ebb4805ca881745d8d423e1
-
SHA1
22f028df2c461c863617a41083276117467933af
-
SHA256
009c0508d40d396e06c6eddcc700dd505cadaf054784821ec34b17bfb94b5a2b
-
SHA512
cfd6812fc58e9fcc68cfc800f6af2913066f9e49b0686e000c3bbd962ea8c8e4c9fbab67a23ab89a54e5867afb26804241d0cf3c498e35a49349c6afc5482700
-
SSDEEP
96:FFHYuLaZzdLCXXKBK+vCtroGFI6oiqSzNt:F9CzdLCnKBq9oG26oxU
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3648 2988 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucmigp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$_57_\ucmigp.exe"C:\Users\Admin\AppData\Local\Temp\$_57_\ucmigp.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 8002⤵
- Program crash
PID:3648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2988 -ip 29881⤵PID:4828