Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 18:51
Static task
static1
Behavioral task
behavioral1
Sample
eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
oedei.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
oedei.exe
Resource
win10v2004-20241007-en
General
-
Target
eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe
-
Size
303KB
-
MD5
c961fcde5d17604cc66454d49df2cce4
-
SHA1
2a36990e22318e6794597a47e8843fd65dd56ce1
-
SHA256
eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02
-
SHA512
0e9db8b031a10780e21707c3d06853e9eea3b2d96648a8f4d9711a5fe4ab090d11588cd3459d35eaf53b8ed670518a307358a46ac579b7f370fb6464bc756d75
-
SSDEEP
6144:rGiko9Al1iqDsAkONYosCxEi9W8A7MmHuvVw0UY:rSl1idGJx/zABuvVw09
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1532 oedei.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3668 1532 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oedei.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1488 wrote to memory of 1532 1488 eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe 83 PID 1488 wrote to memory of 1532 1488 eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe 83 PID 1488 wrote to memory of 1532 1488 eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe 83 PID 1532 wrote to memory of 2064 1532 oedei.exe 84 PID 1532 wrote to memory of 2064 1532 oedei.exe 84 PID 1532 wrote to memory of 2064 1532 oedei.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe"C:\Users\Admin\AppData\Local\Temp\eb6a3606545277e3af8270d85b4940be7a710dcaf11c7351755675d81ce82d02.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\oedei.exeC:\Users\Admin\AppData\Local\Temp\oedei.exe C:\Users\Admin\AppData\Local\Temp\vxgwyb2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\oedei.exeC:\Users\Admin\AppData\Local\Temp\oedei.exe C:\Users\Admin\AppData\Local\Temp\vxgwyb3⤵PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 5843⤵
- Program crash
PID:3668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1532 -ip 15321⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD54edd601ceefe5dba66ae940590ded16e
SHA11273d943d6d50086b76f776bca6c2b37843eb9fb
SHA256a4c546b30bea9d344bf0904629167837e0c32f9143ead2aedb342acd8f85d5a2
SHA51212600c5c4e2f0a506f657d1063c2594e6f0d53d941da0cc5684e70e6539733ef50bf99eb4d06699887843fdd0bc33fbed1632b999f2fe4e481c136a3bf4acebb
-
Filesize
117KB
MD52efd32c76b350a2f0ef015379b4e6079
SHA1fe94d4f744e9f38a19350dc7f49443d0b9c744a7
SHA256a498f803fd0cccb67d13228e97ca0d2dcb7cc149b080604efd3dd4f43fb4488c
SHA5129f98a8b54e19bd1ce4819e71bd6e944bc5a476bb2488d1f035de1fdfa59f22fc7c9ee8b5df6715eb5ace9013c4441e573e7a7cbd710e7b4c7d220cf5a3f5273d
-
Filesize
5KB
MD532488c2847bffe8b46bbf2124459b1eb
SHA165c384911d38d9c5dbae0c35a9cf487959615fef
SHA25665940887ee491e50cfe725503c19cb9b130f5ca1c350a4ac58c9d4e6c10f4247
SHA512f8913b48382eb34add23810f570267e83a45b1775a26eb568920802b01cad953c8604a83641bc43539dfcc65863538206ce21b674d0754f9e3fc22392f72f565