Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe
Resource
win7-20241010-en
General
-
Target
c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe
-
Size
911KB
-
MD5
4f166133072870ee10e716ce07dce7d7
-
SHA1
a45d9d51f63d7169f61a8298c3c1a6360836ac15
-
SHA256
c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83
-
SHA512
e219c7af0b7d3fd28c0c67e7b255ee0ab581cafc110f7204577ca22e50cc3fb64d9dd528c7dcaa8e5cf7434c284b35c836dcf8c985540325a156aad6c5f8af10
-
SSDEEP
12288:GJd7xDyNZHN32RDRua9FZzrGHQTMDPnA46X3/aeSGxF10mhXWty7Xy5mQmkR/zEm:6dtuNtN32rRLZqQyp4HSGxZhXWO5m
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2784 1824 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PPT_Test.Application\CLSID\ = "{DE7CBE17-0368-40E2-8357-1639DA027BAB}" c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE7CBE17-0368-40E2-8357-1639DA027BAB}\InprocHandler32\ = "ole32.dll" c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE7CBE17-0368-40E2-8357-1639DA027BAB}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\C0E342~1.EXE" c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PPT_Test.Application\ = "PPT_Test.Application" c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE7CBE17-0368-40E2-8357-1639DA027BAB} c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE7CBE17-0368-40E2-8357-1639DA027BAB}\ = "PPT_Test.Application" c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE7CBE17-0368-40E2-8357-1639DA027BAB}\ProgID\ = "PPT_Test.Application" c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE7CBE17-0368-40E2-8357-1639DA027BAB}\InprocHandler32 c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE7CBE17-0368-40E2-8357-1639DA027BAB}\LocalServer32 c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPT_Test.Application c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPT_Test.Application\CLSID c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE7CBE17-0368-40E2-8357-1639DA027BAB}\ProgID c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1824 c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1824 c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe 1824 c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2784 1824 c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe 30 PID 1824 wrote to memory of 2784 1824 c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe 30 PID 1824 wrote to memory of 2784 1824 c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe 30 PID 1824 wrote to memory of 2784 1824 c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe"C:\Users\Admin\AppData\Local\Temp\c0e342ac962f7922722645e8bc2315a7c37e13d8b1f1e76dbb4cf8ad9e64fa83.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 2322⤵
- Program crash
PID:2784
-