Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 18:05

General

  • Target

    G-77904DOC.exe

  • Size

    300KB

  • MD5

    e133504aa7c92bcc8b358abfa4c36a20

  • SHA1

    68a3dc52c35115003d74c224dfc3f9e95bd00c04

  • SHA256

    58a064152959df9f0b10cb78b8cdcda6eae112619a7239ddc0c18547e7e3a598

  • SHA512

    98b75db2b869e910565321e829689366be7f319cf6f3aaaac65d06a36b6985cbdec0e16261bfeb0f93b8a48d5b1c707ef28deb84430ccb738dff0699a3a5fd60

  • SSDEEP

    6144:rGiwlK7jQRnqGFYtTJJr3+WZmHXH0CNK0d2Rr+oGJyRt1sy2:QcQxYtTbr1Z4/XZMwy2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\G-77904DOC.exe
    "C:\Users\Admin\AppData\Local\Temp\G-77904DOC.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Users\Admin\AppData\Local\Temp\gavvjlio.exe
      C:\Users\Admin\AppData\Local\Temp\gavvjlio.exe C:\Users\Admin\AppData\Local\Temp\rudvuunoky
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4944
      • C:\Users\Admin\AppData\Local\Temp\gavvjlio.exe
        C:\Users\Admin\AppData\Local\Temp\gavvjlio.exe C:\Users\Admin\AppData\Local\Temp\rudvuunoky
        3⤵
          PID:3420
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 592
          3⤵
          • Program crash
          PID:3508
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4944 -ip 4944
      1⤵
        PID:464

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\gavvjlio.exe

        Filesize

        107KB

        MD5

        4f1abaead61fe7411fc7c6ee5082d665

        SHA1

        b4ad83dea14c06e0aa2c2ca582b52a527ec01d77

        SHA256

        e6b54e61fb080c3f6efb98d3ac8d182ad859fee863cc43478c99d3660bec6bd5

        SHA512

        e045f7094df1552776c1542edef3066663fcbfcf7dcd9bc871de273ce087c898aee583f603f34532d94e8ee22f86b550c736ab9232f72c2966cd62613dc5baab

      • C:\Users\Admin\AppData\Local\Temp\iker7dx2hyvtj44

        Filesize

        213KB

        MD5

        a9a514cd5d9c755b8319c055b0d6d06e

        SHA1

        5717539cbc2ab9a7c01443182abfa50bb0520694

        SHA256

        b53b25f3d0418c286e8d4c78fc4080ecd05f00bd6b39fa16241335bfc05670df

        SHA512

        82f9978685f9877e20b24dd60bb32b05c3c23b54275c107cb7017a15f5802d1540ef10709ae90de0b0cef83e32c57c66063aa1db8f8ef7a6708a40d352d7ecf5

      • C:\Users\Admin\AppData\Local\Temp\rudvuunoky

        Filesize

        4KB

        MD5

        cd2d9713ae5995ee2bf3af08d8eecc52

        SHA1

        c08cf6596eb17e3f52295cef79c51b67c86bf407

        SHA256

        ad332e48b605d4d44a205c3bc93414696b372e08efdb9d423b69452a04db9e67

        SHA512

        e3a5ce9c56ac429f6ab33c79b57580155173bdb9e2f010d952d32ee95e08db893004b6bf37e4665f112b3b2bb01210e71fb125a9772addbc9a9c985224ed3fb5

      • memory/4944-8-0x0000000001250000-0x0000000001252000-memory.dmp

        Filesize

        8KB