Analysis
-
max time kernel
93s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 16:21
Static task
static1
Behavioral task
behavioral1
Sample
d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d.exe
Resource
win10v2004-20241007-en
General
-
Target
d.exe
-
Size
556KB
-
MD5
525d814ba020a890dd87677747f01f90
-
SHA1
7525642890e312224a14754dcf4006b5cd9d1575
-
SHA256
814af02b5de01b583cad8808550f7f44c06b473cf92e04da6708120a30fbefcd
-
SHA512
e350caf0d73b9335e2544f4e63e7abd14dde08060044cf91a7259314561800f696647c7242b43a726ac7e3fe7b0fe3765b9246b8950eded7449705a3e2dc2a59
-
SSDEEP
12288:TMN1EWOMZuXY6rNGu9X/9FxSvFWQbXiyadK3uw7zT4q:TMN1EWOMZuXYQcc9F4WQbXiyadK3N7P
Malware Config
Extracted
metasploit
windows/download_exec
http://globalcert.io.global.prod.fastly.net:443/api/v1/user/512/avatar
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Program crash 1 IoCs
pid pid_target Process procid_target 3128 4624 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4252 wrote to memory of 4624 4252 d.exe 83 PID 4252 wrote to memory of 4624 4252 d.exe 83 PID 4252 wrote to memory of 4624 4252 d.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d.exe"C:\Users\Admin\AppData\Local\Temp\d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\d.exeC:\Users\Admin\AppData\Local\Temp\d.exe wcOwQpG2⤵
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 14563⤵
- Program crash
PID:3128
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4624 -ip 46241⤵PID:436