Analysis

  • max time kernel
    136s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 23:24

General

  • Target

    lab_samples/b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7.exe

  • Size

    659KB

  • MD5

    b3dc48d13f7d541fa583bf964c0603bf

  • SHA1

    1dbaa68adc0a592508f7ad715bfcdf79c17990d6

  • SHA256

    b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7

  • SHA512

    193bda0656a9d1be54dc655d9af3224ddccb78fc26aa77618fba1e3c36005a0368a200960cc28facc280df667f51a26bbef62282bbf8837cc036a41bfb8525f4

  • SSDEEP

    12288:JR2N+L3K6boxK6dSmiTwntcm3Kbjbgv8YXoNCMF6+yWiL4Wlsfppj4W:P8+L3UM6SIcsHj4N5F6+yW/W4XP

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\lab_samples\b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7.exe
    "C:\Users\Admin\AppData\Local\Temp\lab_samples\b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
      C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2448
      • C:\Windows\SYSTEM32\svchost.exe
        svchost.exe -k netsvcs
        3⤵
          PID:1452
    • C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
      C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4136
      • C:\Windows\system32\svchost.exe
        svchost.exe -k netsvcs
        2⤵
          PID:3572
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 560
          2⤵
          • Program crash
          PID:2020
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4136 -ip 4136
        1⤵
          PID:4840

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe

          Filesize

          659KB

          MD5

          b3dc48d13f7d541fa583bf964c0603bf

          SHA1

          1dbaa68adc0a592508f7ad715bfcdf79c17990d6

          SHA256

          b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7

          SHA512

          193bda0656a9d1be54dc655d9af3224ddccb78fc26aa77618fba1e3c36005a0368a200960cc28facc280df667f51a26bbef62282bbf8837cc036a41bfb8525f4

        • memory/1452-24-0x0000000140000000-0x0000000140023000-memory.dmp

          Filesize

          140KB

        • memory/1452-23-0x0000011BB8F50000-0x0000011BB8F51000-memory.dmp

          Filesize

          4KB

        • memory/1452-22-0x0000000140000000-0x0000000140023000-memory.dmp

          Filesize

          140KB

        • memory/2448-19-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB

        • memory/2448-20-0x0000000002340000-0x000000000237C000-memory.dmp

          Filesize

          240KB

        • memory/2448-32-0x00000000027E0000-0x0000000002AA9000-memory.dmp

          Filesize

          2.8MB

        • memory/2448-11-0x0000000002120000-0x0000000002121000-memory.dmp

          Filesize

          4KB

        • memory/2448-13-0x0000000002340000-0x000000000237C000-memory.dmp

          Filesize

          240KB

        • memory/2448-12-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB

        • memory/2448-15-0x0000000010000000-0x0000000010007000-memory.dmp

          Filesize

          28KB

        • memory/2448-21-0x00000000026D0000-0x00000000026D1000-memory.dmp

          Filesize

          4KB

        • memory/2448-31-0x00000000026E0000-0x000000000279E000-memory.dmp

          Filesize

          760KB

        • memory/3572-48-0x0000000140000000-0x0000000140023000-memory.dmp

          Filesize

          140KB

        • memory/4136-34-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB

        • memory/4136-50-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB

        • memory/4136-51-0x00000000012C0000-0x000000000137E000-memory.dmp

          Filesize

          760KB

        • memory/4136-52-0x0000000001380000-0x0000000001649000-memory.dmp

          Filesize

          2.8MB

        • memory/5048-6-0x0000000002160000-0x000000000219C000-memory.dmp

          Filesize

          240KB

        • memory/5048-3-0x0000000002100000-0x0000000002101000-memory.dmp

          Filesize

          4KB

        • memory/5048-1-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB

        • memory/5048-2-0x0000000002160000-0x000000000219C000-memory.dmp

          Filesize

          240KB

        • memory/5048-0-0x0000000002100000-0x0000000002101000-memory.dmp

          Filesize

          4KB

        • memory/5048-5-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB