Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
bb4c6c01b5e866d18d6d6559242b42e79ca9980cd9dfa0db7b4331395a6b5204.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bb4c6c01b5e866d18d6d6559242b42e79ca9980cd9dfa0db7b4331395a6b5204.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
uyzzokhns.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
uyzzokhns.exe
Resource
win10v2004-20241007-en
General
-
Target
bb4c6c01b5e866d18d6d6559242b42e79ca9980cd9dfa0db7b4331395a6b5204.exe
-
Size
241KB
-
MD5
cb7d4c1dc8b01bf82bb52937e5deeac4
-
SHA1
458dba8f4563cd030afb237d69293208d71149ad
-
SHA256
bb4c6c01b5e866d18d6d6559242b42e79ca9980cd9dfa0db7b4331395a6b5204
-
SHA512
3565215740241e089565892b74108c0cd408433803d4fd435fc8f5ca878b23ced260732ffb59d617bdb91bf7429af630464bb6718469d35ffa10f2aaab8cb633
-
SSDEEP
6144:HNeZmj7TSnqxNkECqXi2g8mKtIQgfCHaK2r1:HNljvbxNVCqXiJ8zIQ7aKE1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4384 uyzzokhns.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4896 4384 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb4c6c01b5e866d18d6d6559242b42e79ca9980cd9dfa0db7b4331395a6b5204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uyzzokhns.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 920 wrote to memory of 4384 920 bb4c6c01b5e866d18d6d6559242b42e79ca9980cd9dfa0db7b4331395a6b5204.exe 83 PID 920 wrote to memory of 4384 920 bb4c6c01b5e866d18d6d6559242b42e79ca9980cd9dfa0db7b4331395a6b5204.exe 83 PID 920 wrote to memory of 4384 920 bb4c6c01b5e866d18d6d6559242b42e79ca9980cd9dfa0db7b4331395a6b5204.exe 83 PID 4384 wrote to memory of 3596 4384 uyzzokhns.exe 84 PID 4384 wrote to memory of 3596 4384 uyzzokhns.exe 84 PID 4384 wrote to memory of 3596 4384 uyzzokhns.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb4c6c01b5e866d18d6d6559242b42e79ca9980cd9dfa0db7b4331395a6b5204.exe"C:\Users\Admin\AppData\Local\Temp\bb4c6c01b5e866d18d6d6559242b42e79ca9980cd9dfa0db7b4331395a6b5204.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\uyzzokhns.exeC:\Users\Admin\AppData\Local\Temp\uyzzokhns.exe C:\Users\Admin\AppData\Local\Temp\exhfalpw2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\uyzzokhns.exeC:\Users\Admin\AppData\Local\Temp\uyzzokhns.exe C:\Users\Admin\AppData\Local\Temp\exhfalpw3⤵PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 5923⤵
- Program crash
PID:4896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4384 -ip 43841⤵PID:4584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD50822c633a0ac58fd25ce73eeb959f4c1
SHA1e5bf5daf96e475ee50796a051b4ca9749b6d7a8f
SHA256087f688071a1e7081b435756668883d393546bafd81270a16f61870ac9eda3a8
SHA512f8869b97ecb992b4727efd652a7b835907a86db39712257e9ebee2c3469c6f5a0e1380bbaf077e66f338f5f22c569a3d05a9a2e21eef26d3b6e1a90e1b59573a
-
Filesize
5KB
MD578bbf1cff4144ac88fb2fa7a53196d91
SHA1c7daf19ac7143a2e02173d03223a9bcbcb6e44b9
SHA2562a46132c92ba642674b00ea5df006856498d67b30f64ca5c74061303b056ec0f
SHA5125eb68cdaaeec7990b1358853a7a2c2b01ff81c24d1cdf2e931a20475bcb1957ac4a42f723e51b2c1a51bf837d0af784d0681027634d6260d04f400d618e9a4a6
-
Filesize
212KB
MD55860d5089dab44b3cff2e069f272e2ad
SHA17ee5a2e6702c5e18637d98a7abe4c7e7645451b6
SHA256d10e73800fbba7998a4f8a7a6bf57b1f343f447864080e196e966e6a3b22e435
SHA512214da883c24bb31d1452953fdb73ac991276b15c9800356eeb6b2138fbb4909cc758fd9b3aa5eced847062cb3a5ae623bf92486c995242a53e19b411f65c8aab