Analysis

  • max time kernel
    94s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 00:04

General

  • Target

    f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe

  • Size

    238KB

  • MD5

    102b3ebb841c1dffa5b08afcc39222dc

  • SHA1

    758e0993c007af3949a60a0ffe1ec19c4e045ced

  • SHA256

    f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25

  • SHA512

    e1452b4ac7b453b6f899554b223596e7ce258986358e56b3f2dc69bafc2178b6c83894fe507dd9a5d4d0df687b584ae41ada6482b1e73d208e0cb59ca37ac446

  • SSDEEP

    6144:TxDpLHyngojOTo5Y+pfy3jBabNIjhfFcauPkqSEaBx5KNWYi17lrsAo:jDSpyo5Y+pqVabW3ca+eKMtsAo

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe
    "C:\Users\Admin\AppData\Local\Temp\f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3196
    • C:\Users\Admin\AppData\Local\Temp\wivczschg.exe
      C:\Users\Admin\AppData\Local\Temp\wivczschg.exe C:\Users\Admin\AppData\Local\Temp\bqbubiphod
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1088
      • C:\Users\Admin\AppData\Local\Temp\wivczschg.exe
        C:\Users\Admin\AppData\Local\Temp\wivczschg.exe C:\Users\Admin\AppData\Local\Temp\bqbubiphod
        3⤵
          PID:2828
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 708
          3⤵
          • Program crash
          PID:2428
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1088 -ip 1088
      1⤵
        PID:2132

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\64mfra74j7jvxc

        Filesize

        213KB

        MD5

        b12547b07cd7190d39483d6edc98a6a2

        SHA1

        88597120504ec40dfd469792846cc170113db9e1

        SHA256

        328bc274527798a2b7dfcfac1a4d23a650d8c144b11fd460bd57b3828aeab4cb

        SHA512

        6ca6a1a15b7cc1f8e32a3d2ca23cc2d4df991e96feaa8ee10ecd5ba3c021842607cb85750585a146b9eca4dd54c4cebffd003bd552a982cd3c68622d7d6286f7

      • C:\Users\Admin\AppData\Local\Temp\bqbubiphod

        Filesize

        4KB

        MD5

        891d27523f3e020b2a4a438c2ae80ccb

        SHA1

        df17db0cb95b25d5f3106d9704f7138bcb6dea58

        SHA256

        8344dc093d4b4d194df178d6b88fe5266bb95fbb5626f0c191edcf8dad662279

        SHA512

        73732185648d17558eb9e8c48742cf1d829aa99be74253014c2b00c855e3e1551d3e959c9fa29e3cabfc30d4c8cc5e0ec7471d2ef976a05f624b8754779bb399

      • C:\Users\Admin\AppData\Local\Temp\wivczschg.exe

        Filesize

        6KB

        MD5

        aff04f5ef16ed23b7c7b3a15e5ea644a

        SHA1

        ca4639d4d6c7294c03816943c0a29f4bccf943c3

        SHA256

        cf56b1b6dde6ae7800d3d1af04c154a5c5c635422cb2417cfc8f29ee665c1359

        SHA512

        1954c3e6d5ef261effd9de98d862ed429a1bbe7fc8d9c9b18c43c3da4132991a31006ade1a2c06c5c2449782223cb26d52173c9ac18d849ec26f7d458210773a

      • memory/1088-8-0x0000000000B70000-0x0000000000B72000-memory.dmp

        Filesize

        8KB