Analysis

  • max time kernel
    93s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 10:42

General

  • Target

    70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe

  • Size

    358KB

  • MD5

    7e9e3aeebbafdb0a1fa065ee5ad217ec

  • SHA1

    6064e1dbc3129e3f69e701946d54191b42eb6a92

  • SHA256

    70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156

  • SHA512

    27fb97317d7484c3c770eb5073b682a76dd76bcb93c3475c979e0d7bf781f7d7de71a51761ea9ee239e53a2d39ad1e986cdc9efa22389934088daef3dec70d33

  • SSDEEP

    6144:rGiF3GRJUnjyWkqKwmT20Wv60Dir1SNuaeTUqUPcLPTS43RIWi1ov2+fmIN5UgK:h3OJMLk5tESVTU8DTS43R4ovPfmWu

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe
    "C:\Users\Admin\AppData\Local\Temp\70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Users\Admin\AppData\Local\Temp\70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe
      "C:\Users\Admin\AppData\Local\Temp\70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe"
      2⤵
        PID:2420
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4560 -s 880
        2⤵
        • Program crash
        PID:4964
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4560 -ip 4560
      1⤵
        PID:5092

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\nsnA76C.tmp\orcyebry.dll

        Filesize

        175KB

        MD5

        3b4056f9ef87716b0e0ed45da70d258f

        SHA1

        59efd5883fee51f07066e92753be09454444da62

        SHA256

        a9b13e44fc7a247368e980cf20889619100caad4387662b639923eda30bcf9b9

        SHA512

        accbe50cc40caf0b4b2d0569b67fbcaa64edf35a68104e23e7d941be7ccf2548ae9d1e9b4b271caff0f828220055f50f9176c9eed0871a1c056f6e7cc1d8a04d

      • memory/4560-6-0x0000000074780000-0x00000000747B0000-memory.dmp

        Filesize

        192KB

      • memory/4560-9-0x0000000074780000-0x00000000747B0000-memory.dmp

        Filesize

        192KB