Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 13:48
Static task
static1
Behavioral task
behavioral1
Sample
19abdec12c4b7f3fd7a1912867b03527e8b93548cacf14c0a9b3bec61989a573.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
19abdec12c4b7f3fd7a1912867b03527e8b93548cacf14c0a9b3bec61989a573.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
cbpklgiv.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
cbpklgiv.exe
Resource
win10v2004-20241007-en
General
-
Target
19abdec12c4b7f3fd7a1912867b03527e8b93548cacf14c0a9b3bec61989a573.exe
-
Size
294KB
-
MD5
1232d8adee3eacc8a6d6757cb2b2850d
-
SHA1
b55e8f7f49e2db9c3279fe71214cf54a4e81c69f
-
SHA256
19abdec12c4b7f3fd7a1912867b03527e8b93548cacf14c0a9b3bec61989a573
-
SHA512
fc0808dc711eb04ebc204cf9e9e3b28cd583fe91037698152a4dca8b5be62d1443175570f444c546a737ff2510007f65e217de707d94010d13d76d2e371896ee
-
SSDEEP
6144:owpg4eB/W8sfYIUAXvjBkPloYw/C/Yz2K1A3pDlzE3iMMknvxw:Vg4eB+8p1CvValoYwak2KS3tlQz7nS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4888 cbpklgiv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4132 4888 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19abdec12c4b7f3fd7a1912867b03527e8b93548cacf14c0a9b3bec61989a573.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbpklgiv.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4816 wrote to memory of 4888 4816 19abdec12c4b7f3fd7a1912867b03527e8b93548cacf14c0a9b3bec61989a573.exe 83 PID 4816 wrote to memory of 4888 4816 19abdec12c4b7f3fd7a1912867b03527e8b93548cacf14c0a9b3bec61989a573.exe 83 PID 4816 wrote to memory of 4888 4816 19abdec12c4b7f3fd7a1912867b03527e8b93548cacf14c0a9b3bec61989a573.exe 83 PID 4888 wrote to memory of 1456 4888 cbpklgiv.exe 84 PID 4888 wrote to memory of 1456 4888 cbpklgiv.exe 84 PID 4888 wrote to memory of 1456 4888 cbpklgiv.exe 84 PID 4888 wrote to memory of 1456 4888 cbpklgiv.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\19abdec12c4b7f3fd7a1912867b03527e8b93548cacf14c0a9b3bec61989a573.exe"C:\Users\Admin\AppData\Local\Temp\19abdec12c4b7f3fd7a1912867b03527e8b93548cacf14c0a9b3bec61989a573.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\cbpklgiv.exeC:\Users\Admin\AppData\Local\Temp\cbpklgiv.exe C:\Users\Admin\AppData\Local\Temp\zoaeznutt2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\cbpklgiv.exeC:\Users\Admin\AppData\Local\Temp\cbpklgiv.exe C:\Users\Admin\AppData\Local\Temp\zoaeznutt3⤵PID:1456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 3963⤵
- Program crash
PID:4132
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4888 -ip 48881⤵PID:4156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD5d04a14c986145807ea9fe37a7126d675
SHA128dee42f5cec69d0117156d96231887a4aa7d8a7
SHA2566c019f60af2c9281a9c17b27a336749283767ac9229c9d3bbcd8ccedc290b417
SHA512df9f899629bc4c32704f19cea834c62da6ac6bb1043ac801069d3418f4a14ca28175ace78da4bb5ea4034509891b336db9d519d8370b388148461453a20ca526
-
Filesize
213KB
MD5a85cdb1b16010d291aa6ccf2e25182f5
SHA16e4edfdf13ec37b9f2b5f84294ecef387c695238
SHA256a02caa90974dc2a92503fcfa6ac9fdee8b4550d8f90461db58b2b089bbf3ac69
SHA512ca3db124ddd53c74ba34f5dd739a924e8bfdffb70082fa2be200679f8a2eeb47597af875dfbb2c285e8ae55beb4dd430a1ab6e39f0dea2dd0c998d501a44a147
-
Filesize
5KB
MD564f393c5a8842c82a985e249338fbcc7
SHA1b70d5d4ddbbabdd3060a8ee18869cb756790e88b
SHA25677d797a3c964b84a870674a8c1b81b79d581afb6569aca7bbfab4c488e664597
SHA5126c45c4a80e7101f1ddef4e250d05a7ba35cb558f324aea2e02641d70dcbd6432f313ad0217fb9c0bd300b28ad1c3759e4dd3c5d2335f5ee9832d62c4f54e04ff