Analysis
-
max time kernel
94s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
wivczschg.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
wivczschg.exe
Resource
win10v2004-20241007-en
General
-
Target
f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe
-
Size
238KB
-
MD5
102b3ebb841c1dffa5b08afcc39222dc
-
SHA1
758e0993c007af3949a60a0ffe1ec19c4e045ced
-
SHA256
f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25
-
SHA512
e1452b4ac7b453b6f899554b223596e7ce258986358e56b3f2dc69bafc2178b6c83894fe507dd9a5d4d0df687b584ae41ada6482b1e73d208e0cb59ca37ac446
-
SSDEEP
6144:TxDpLHyngojOTo5Y+pfy3jBabNIjhfFcauPkqSEaBx5KNWYi17lrsAo:jDSpyo5Y+pqVabW3ca+eKMtsAo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1088 wivczschg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2428 1088 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wivczschg.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3196 wrote to memory of 1088 3196 f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe 84 PID 3196 wrote to memory of 1088 3196 f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe 84 PID 3196 wrote to memory of 1088 3196 f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe 84 PID 1088 wrote to memory of 2828 1088 wivczschg.exe 86 PID 1088 wrote to memory of 2828 1088 wivczschg.exe 86 PID 1088 wrote to memory of 2828 1088 wivczschg.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe"C:\Users\Admin\AppData\Local\Temp\f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\wivczschg.exeC:\Users\Admin\AppData\Local\Temp\wivczschg.exe C:\Users\Admin\AppData\Local\Temp\bqbubiphod2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\wivczschg.exeC:\Users\Admin\AppData\Local\Temp\wivczschg.exe C:\Users\Admin\AppData\Local\Temp\bqbubiphod3⤵PID:2828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 7083⤵
- Program crash
PID:2428
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1088 -ip 10881⤵PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5b12547b07cd7190d39483d6edc98a6a2
SHA188597120504ec40dfd469792846cc170113db9e1
SHA256328bc274527798a2b7dfcfac1a4d23a650d8c144b11fd460bd57b3828aeab4cb
SHA5126ca6a1a15b7cc1f8e32a3d2ca23cc2d4df991e96feaa8ee10ecd5ba3c021842607cb85750585a146b9eca4dd54c4cebffd003bd552a982cd3c68622d7d6286f7
-
Filesize
4KB
MD5891d27523f3e020b2a4a438c2ae80ccb
SHA1df17db0cb95b25d5f3106d9704f7138bcb6dea58
SHA2568344dc093d4b4d194df178d6b88fe5266bb95fbb5626f0c191edcf8dad662279
SHA51273732185648d17558eb9e8c48742cf1d829aa99be74253014c2b00c855e3e1551d3e959c9fa29e3cabfc30d4c8cc5e0ec7471d2ef976a05f624b8754779bb399
-
Filesize
6KB
MD5aff04f5ef16ed23b7c7b3a15e5ea644a
SHA1ca4639d4d6c7294c03816943c0a29f4bccf943c3
SHA256cf56b1b6dde6ae7800d3d1af04c154a5c5c635422cb2417cfc8f29ee665c1359
SHA5121954c3e6d5ef261effd9de98d862ed429a1bbe7fc8d9c9b18c43c3da4132991a31006ade1a2c06c5c2449782223cb26d52173c9ac18d849ec26f7d458210773a