Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 02:23
Static task
static1
Behavioral task
behavioral1
Sample
4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exe
-
Size
820KB
-
MD5
a75036f188683604d03dd8f03fee6ec3
-
SHA1
cc2c07398c85ffcd033223d01155851647d0ee68
-
SHA256
4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531
-
SHA512
2a32707969a776c20150ab79b62204918ad6a96599acc99c7d6e99ce1c43eadb77fdf79c0dc59eb517005ab16d6aaa28ab229e68d20bf087ec82a957837390e1
-
SSDEEP
12288:7b0EifOJq8Ikm2qv1GV8gmxJziOoA3TB98/0v7Z0Q9i4xw3u5IDkd72gGmkRJWk6:7bxgGKLz8G/XBO/0vOAi4xwk9VS6n
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exepid Process 2512 4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exe 2512 4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exe -
Drops file in Program Files directory 1 IoCs
Processes:
4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exedescription ioc Process File opened for modification C:\Program Files (x86)\rumsonderne\rendyrkes.plu 4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exe -
Drops file in Windows directory 2 IoCs
Processes:
4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exedescription ioc Process File opened for modification C:\Windows\resources\mineralrigste.ini 4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exe File opened for modification C:\Windows\spaller.ini 4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2748 2512 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exedescription pid Process procid_target PID 2512 wrote to memory of 2748 2512 4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exe 31 PID 2512 wrote to memory of 2748 2512 4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exe 31 PID 2512 wrote to memory of 2748 2512 4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exe 31 PID 2512 wrote to memory of 2748 2512 4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exe"C:\Users\Admin\AppData\Local\Temp\4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 4962⤵
- Program crash
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5b0c77267f13b2f87c084fd86ef51ccfc
SHA1f7543f9e9b4f04386dfbf33c38cbed1bf205afb3
SHA256a0cac4cf4852895619bc7743ebeb89f9e4927ccdb9e66b1bcd92a4136d0f9c77
SHA512f2b57a2eea00f52a3c7080f4b5f2bb85a7a9b9f16d12da8f8ff673824556c62a0f742b72be0fd82a2612a4b6dbd7e0fdc27065212da703c2f7e28d199696f66e