Overview
overview
10Static
static
1009fe7735f7...8a.exe
windows11-21h2-x64
100a08857b3b...19.vbs
windows11-21h2-x64
100a92b6b6c9...d0.exe
windows11-21h2-x64
100b1f6297e8...e6.exe
windows11-21h2-x64
100b4ffb13a4...aa.exe
windows11-21h2-x64
100b9a6ed57e...55.exe
windows11-21h2-x64
70be395d43c...ca.exe
windows11-21h2-x64
70c046f07cd...89.exe
windows11-21h2-x64
100c1e5acd77...53.exe
windows11-21h2-x64
100d825ad1df...37.exe
windows11-21h2-x64
100db3c21dec...f9.exe
windows11-21h2-x64
100de875f11e...e9.exe
windows11-21h2-x64
100e3bb95b7b...77.exe
windows11-21h2-x64
100edd5342b1...6d.exe
windows11-21h2-x64
30f4450a6b2...b6.exe
windows11-21h2-x64
1010758789ca...d1.exe
windows11-21h2-x64
1011a3fde6fb...96.exe
windows11-21h2-x64
1011bb525d06...1c.exe
windows11-21h2-x64
10124dcea053...69.exe
windows11-21h2-x64
1013431e2ee5...1c.elf
windows11-21h2-x64
315387da23f...315.js
windows11-21h2-x64
815938b5637...72.exe
windows11-21h2-x64
10170dc238d7...a4.exe
windows11-21h2-x64
101728680969...4d.xll
windows11-21h2-x64
1017dadc2b10...b1.elf
windows11-21h2-x64
3190ffc93d1...d7.apk
windows11-21h2-x64
31a4383821d...e1.vbs
windows11-21h2-x64
81aa85c5026...8d.exe
windows11-21h2-x64
101b13d05cae...26.exe
windows11-21h2-x64
71b9334e09c...52.exe
windows11-21h2-x64
101bcbf1dce6...0c.exe
windows11-21h2-x64
71bd3fa491c...5b.exe
windows11-21h2-x64
10Analysis
-
max time kernel
1s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-12-2024 22:57
Static task
static1
Behavioral task
behavioral1
Sample
09fe7735f742e003ace00c9884b1eb6d55c719735a1fcd207ac985ce746b008a.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
0a08857b3b6b52510c544f54f8b7489038e371a85db858ad3c34c4f7198da819.vbs
Resource
win11-20241023-en
Behavioral task
behavioral3
Sample
0a92b6b6c9ccba573ca47718bf608715dbc87ad48afc19bf7004d8eb9bf598d0.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
0b1f6297e8bfa8fc9ff8a7ad85487ff456c0d66ef2d908588cd27345fba5f4e6.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
0b4ffb13a42cb2432b4e021c18f4b4dd51b669ba0356804ca32dac2de7741caa.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
0b9a6ed57e23d874bde98d89d3c50a44b3982570cb8bbf41660fad19d3fbe855.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
0be395d43c98fe7b2d0fff10863410665ee11ce31a10277dc03049e77661b1ca.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
0c046f07cd96f008a224dc272c32b52af4611cd1852d38db9737abbe3fcf9e89.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
0c1e5acd77d667335c59b10f7bd08997ff5bac4aeb52722fffe17c60d1779553.exe
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
0d825ad1df7c2ac718991f061800e31c6ae4ac7a35516676ac0dad40b84b6037.exe
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
0db3c21dec09a297e99a07ec1ebd007146adfbcb3c8f0d4a3f88868778c6aef9.exe
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
0de875f11ee5d69c5b4633e3b878529f08788440f87fb3ab0cde77e698b200e9.exe
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
0e3bb95b7ba92dadc59985e6b0d1a75db091d6ca03f755fca34437398217f877.exe
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
0edd5342b1fc252b5164f41118b0b0e69d954772a4ec6ee14f49d15fa4ddf66d.exe
Resource
win11-20241023-en
Behavioral task
behavioral15
Sample
0f4450a6b298d95d7fdd6ac63a917b1975221fe90e520ff30e9c6b0d8a4955b6.exe
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
10758789ca875d9783a8988e0b0dbfd88f75a6ac0eb544b5b37241492223fdd1.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
11a3fde6fbce94c261cc8785856d132eccd5239e95a9129c2ba404cad58bbd96.exe
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
11bb525d06957723f55934f7697eaf4c6e0437e435d3fea9f1f4a16d71cd041c.exe
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
124dcea053b32060dc96c5b2901df4264837a87ea25e635e0ac76145450d9a69.exe
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
13431e2ee5bc86bdc9b53f47dd2ea61912a00952a3ea8f97ea3842ad7053551c.elf
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
15387da23f7465d5c4ccd137bc21d15d74c0006c7536b92afed5337cdb3e0315.js
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
15938b5637e639c182992c8fdf65b8db3d461c85f6eac57044f40d2a68955372.exe
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
170dc238d7e8c6f55a0aedddd2d01deb03d62e71d7da5c51f67632d2de3f93a4.exe
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
17286809694b9d22325e29af4e74b2083398de0488d9a96644566c468628554d.xll
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
17dadc2b105c925bb5d598789e418a9fdedac3a5a26a05fa4b77c8d82f685bb1.elf
Resource
win11-20241023-en
Behavioral task
behavioral26
Sample
190ffc93d1cf8112811d0568736905e6a943cc4787fb569754ed7e15ecd2efd7.apk
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
1a4383821db896055970d1358d5f3591a7b5963f93ffcca737ac94bf6972cce1.vbs
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
1aa85c5026608d04abec7b7af789f3b5e28c59064733c0efdb942a543926558d.exe
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
1b13d05cae0e4eac18dbaffe04a238238d6c2c2be285d825712cfbef91341326.exe
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
1b9334e09c3df74ba3135169e49533c7a4d5a6c7ce090e31188e6f6a33403b52.exe
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
1bcbf1dce6780dbfb1b1ad1d86f25d4b7a50063be5b4640f8939085980c4e00c.exe
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
1bd3fa491c5de8cb9189ff8f86fd1a7e27a8140e3578f8fa9ebb23931550cc5b.exe
Resource
win11-20241007-en
General
-
Target
1bcbf1dce6780dbfb1b1ad1d86f25d4b7a50063be5b4640f8939085980c4e00c.exe
-
Size
214KB
-
MD5
da9914f2f681c7ef59293d3804c9133d
-
SHA1
49d23c8eac05f7c8af203f0b46f7d805fc4b1724
-
SHA256
1bcbf1dce6780dbfb1b1ad1d86f25d4b7a50063be5b4640f8939085980c4e00c
-
SHA512
3eaaf3ba1df0f3fef3141a3f2fb0e455620ffcf569dbe438d8a8a9fa2173c275897001f6ef52b18b138d5f88e9facc053f7e8a6751c655ee320842ee756f0615
-
SSDEEP
6144:qweEpobsxm+SEfyjP4P3yYZcfrFPWHFjp:bowkAwfrFPWH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1520 hvufe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2264 1520 WerFault.exe 77 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bcbf1dce6780dbfb1b1ad1d86f25d4b7a50063be5b4640f8939085980c4e00c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvufe.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4136 wrote to memory of 1520 4136 1bcbf1dce6780dbfb1b1ad1d86f25d4b7a50063be5b4640f8939085980c4e00c.exe 77 PID 4136 wrote to memory of 1520 4136 1bcbf1dce6780dbfb1b1ad1d86f25d4b7a50063be5b4640f8939085980c4e00c.exe 77 PID 4136 wrote to memory of 1520 4136 1bcbf1dce6780dbfb1b1ad1d86f25d4b7a50063be5b4640f8939085980c4e00c.exe 77 PID 1520 wrote to memory of 432 1520 hvufe.exe 79 PID 1520 wrote to memory of 432 1520 hvufe.exe 79 PID 1520 wrote to memory of 432 1520 hvufe.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bcbf1dce6780dbfb1b1ad1d86f25d4b7a50063be5b4640f8939085980c4e00c.exe"C:\Users\Admin\AppData\Local\Temp\1bcbf1dce6780dbfb1b1ad1d86f25d4b7a50063be5b4640f8939085980c4e00c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\hvufe.exe"C:\Users\Admin\AppData\Local\Temp\hvufe.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\hvufe.exe"C:\Users\Admin\AppData\Local\Temp\hvufe.exe"3⤵PID:432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 5643⤵
- Program crash
PID:2264
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1520 -ip 15201⤵PID:3152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD54c64f48d9a3284d80901d9b31f9a040b
SHA16677b5838c9aee5ffb8ff8072111211659ff1415
SHA2564eb744492572a57a1ffc93da1aa9a9e0874f1c2f1175217597c0106034abaff3
SHA51216b81364b0ae3549f5290622fbaf2b4b53284d3153cceb012eefe0da68cb1d6766f380e6c7432e52c54baa49b85158e6e2ba36b04d5b9bb4cd36a88d4bb23950
-
Filesize
185KB
MD5b7aa910621411a82fff3524a3a11b122
SHA17bbf74d760c0ff094c3016b8c8df59347d52d48a
SHA256ed61b0a9c4db04261e0a003815f8f6704039d484c2b04648f5dc8ec059b799d0
SHA512ecec8babba619f7d86f745f7def0b9cefb1dc12bd2fae8870954079c28e9a80ac5f8521af735c2430671279488223729ed76ec8102fd948907cada74e9ad61ad
-
Filesize
6KB
MD5c20ebe6762bf3ff431b6db1e4fa70a95
SHA185bbc70e270515b53c26966a720249b4559b9835
SHA256bc74795639b62eb7a3958ad888e682031fa055f610db1739e51efa057adbf308
SHA512fc42e76bfe145d52cd3237160cd0d5882ad678c50f009304aa95a4b83fd0fc203169d2325aa20ffc6dcf9b379dad514dc7fbd6f9d0de1395ad22fe71011b5ab6