Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
pastelists.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
pastelists.dll
Resource
win10v2004-20241007-en
General
-
Target
09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe
-
Size
276KB
-
MD5
685d1b61e34fdff8ebd5e1ad7d7a62ae
-
SHA1
e8dc6e16901372dd70f9472a5965e6ec3c39e7e5
-
SHA256
09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770
-
SHA512
754e3a3e74f83733e08aa0830e154b790a5f9c71b7e952013078142c73702c680beb561190b4778ce33ae9192a82b7bff916c31bb83b80cc46d00ee83f09be99
-
SSDEEP
6144:T28A9pceLeNFNYe3ipeVcq1ycyIvNLF/pDQOted5fJMiwT5g:y8GZLeN/d3tcZmP/pkAw5m5g
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2592 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 2592 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2592 set thread context of 3036 2592 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 29 -
resource yara_rule behavioral1/memory/3036-23-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/3036-22-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/3036-20-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/3036-25-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/3036-16-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/3036-15-0x0000000000400000-0x000000000043B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2896 3036 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2592 wrote to memory of 3036 2592 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 29 PID 2592 wrote to memory of 3036 2592 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 29 PID 2592 wrote to memory of 3036 2592 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 29 PID 2592 wrote to memory of 3036 2592 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 29 PID 2592 wrote to memory of 3036 2592 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 29 PID 2592 wrote to memory of 3036 2592 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 29 PID 2592 wrote to memory of 3036 2592 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 29 PID 2592 wrote to memory of 3036 2592 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 29 PID 3036 wrote to memory of 2896 3036 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 30 PID 3036 wrote to memory of 2896 3036 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 30 PID 3036 wrote to memory of 2896 3036 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 30 PID 3036 wrote to memory of 2896 3036 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe"C:\Users\Admin\AppData\Local\Temp\09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe"C:\Users\Admin\AppData\Local\Temp\09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 883⤵
- Program crash
PID:2896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD54d3b19a81bd51f8ce44b93643a4e3a99
SHA135f8b00e85577b014080df98bd2c378351d9b3e9
SHA256fda0018ab182ac6025d2fc9a2efcce3745d1da21ce5141859f8286cf319a52ce
SHA512b2ba9c961c0e1617f802990587a9000979ab5cc493ae2f8ca852eb43eeaf24916b0b29057dbff7d41a1797dfb2dce3db41990e8639b8f205771dbec3fd80f622
-
Filesize
180KB
MD5f2048d943f0965532b8473c445991a5c
SHA109504be04e8e8980698350e5b0713ebb52963e44
SHA256bc9d70d641f5bd5ff5d5686417ee9569d252bcd1f2ff6c5e4972babb9610ac43
SHA51297d0fca60c89cd3c2381dc285b525d3221a32a871e58c3cbf971bed9eb65927ef9c98872a39c9d6f5a15b4e209e177ba3ac45b91797f900b5539c32087a360c5