Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2024 13:48

General

  • Target

    19abdec12c4b7f3fd7a1912867b03527e8b93548cacf14c0a9b3bec61989a573.exe

  • Size

    294KB

  • MD5

    1232d8adee3eacc8a6d6757cb2b2850d

  • SHA1

    b55e8f7f49e2db9c3279fe71214cf54a4e81c69f

  • SHA256

    19abdec12c4b7f3fd7a1912867b03527e8b93548cacf14c0a9b3bec61989a573

  • SHA512

    fc0808dc711eb04ebc204cf9e9e3b28cd583fe91037698152a4dca8b5be62d1443175570f444c546a737ff2510007f65e217de707d94010d13d76d2e371896ee

  • SSDEEP

    6144:owpg4eB/W8sfYIUAXvjBkPloYw/C/Yz2K1A3pDlzE3iMMknvxw:Vg4eB+8p1CvValoYwak2KS3tlQz7nS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19abdec12c4b7f3fd7a1912867b03527e8b93548cacf14c0a9b3bec61989a573.exe
    "C:\Users\Admin\AppData\Local\Temp\19abdec12c4b7f3fd7a1912867b03527e8b93548cacf14c0a9b3bec61989a573.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4816
    • C:\Users\Admin\AppData\Local\Temp\cbpklgiv.exe
      C:\Users\Admin\AppData\Local\Temp\cbpklgiv.exe C:\Users\Admin\AppData\Local\Temp\zoaeznutt
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4888
      • C:\Users\Admin\AppData\Local\Temp\cbpklgiv.exe
        C:\Users\Admin\AppData\Local\Temp\cbpklgiv.exe C:\Users\Admin\AppData\Local\Temp\zoaeznutt
        3⤵
          PID:1456
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 396
          3⤵
          • Program crash
          PID:4132
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4888 -ip 4888
      1⤵
        PID:4156

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\cbpklgiv.exe

        Filesize

        121KB

        MD5

        d04a14c986145807ea9fe37a7126d675

        SHA1

        28dee42f5cec69d0117156d96231887a4aa7d8a7

        SHA256

        6c019f60af2c9281a9c17b27a336749283767ac9229c9d3bbcd8ccedc290b417

        SHA512

        df9f899629bc4c32704f19cea834c62da6ac6bb1043ac801069d3418f4a14ca28175ace78da4bb5ea4034509891b336db9d519d8370b388148461453a20ca526

      • C:\Users\Admin\AppData\Local\Temp\cjt9htnwqgp85kbz2i

        Filesize

        213KB

        MD5

        a85cdb1b16010d291aa6ccf2e25182f5

        SHA1

        6e4edfdf13ec37b9f2b5f84294ecef387c695238

        SHA256

        a02caa90974dc2a92503fcfa6ac9fdee8b4550d8f90461db58b2b089bbf3ac69

        SHA512

        ca3db124ddd53c74ba34f5dd739a924e8bfdffb70082fa2be200679f8a2eeb47597af875dfbb2c285e8ae55beb4dd430a1ab6e39f0dea2dd0c998d501a44a147

      • C:\Users\Admin\AppData\Local\Temp\zoaeznutt

        Filesize

        5KB

        MD5

        64f393c5a8842c82a985e249338fbcc7

        SHA1

        b70d5d4ddbbabdd3060a8ee18869cb756790e88b

        SHA256

        77d797a3c964b84a870674a8c1b81b79d581afb6569aca7bbfab4c488e664597

        SHA512

        6c45c4a80e7101f1ddef4e250d05a7ba35cb558f324aea2e02641d70dcbd6432f313ad0217fb9c0bd300b28ad1c3759e4dd3c5d2335f5ee9832d62c4f54e04ff

      • memory/4888-8-0x00000000005B0000-0x00000000005B2000-memory.dmp

        Filesize

        8KB