Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
oaieFYV.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
oaieFYV.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
hmyvjhoqve.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
hmyvjhoqve.exe
Resource
win10v2004-20241007-en
General
-
Target
oaieFYV.exe
-
Size
244KB
-
MD5
d8be70132f0b64b10f8b9e2fafdaf7a4
-
SHA1
a83a64696c9872f94fa5ddb592113142845470e6
-
SHA256
ae3f17f0d32a8d4f5e5095108f2f0168755351b4cf1d415fa5c3d953872f990b
-
SHA512
cc33bef65a281b06a595a64736481fd87cf2615a0504b698268663cfc20e60af93e1a0976c97f813187ed01b212bfac2166d0f72626c82e7713979cdae77587b
-
SSDEEP
6144:5weEfHdpdgNEov9JAATML4EVzMRYUBalUCAxs0Qch:adpdxov9/fEVzDlf+NQ+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 876 hmyvjhoqve.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1032 876 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oaieFYV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hmyvjhoqve.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1828 wrote to memory of 876 1828 oaieFYV.exe 84 PID 1828 wrote to memory of 876 1828 oaieFYV.exe 84 PID 1828 wrote to memory of 876 1828 oaieFYV.exe 84 PID 876 wrote to memory of 3052 876 hmyvjhoqve.exe 86 PID 876 wrote to memory of 3052 876 hmyvjhoqve.exe 86 PID 876 wrote to memory of 3052 876 hmyvjhoqve.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\oaieFYV.exe"C:\Users\Admin\AppData\Local\Temp\oaieFYV.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\hmyvjhoqve.exe"C:\Users\Admin\AppData\Local\Temp\hmyvjhoqve.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\hmyvjhoqve.exe"C:\Users\Admin\AppData\Local\Temp\hmyvjhoqve.exe"3⤵PID:3052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 876 -s 5643⤵
- Program crash
PID:1032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 876 -ip 8761⤵PID:5112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD500df8877841403a137bc30e8f00d780d
SHA1e05c051c0d7d7b49eec18f33a73e22002c270bf8
SHA2564a3a5f1961878ee5b09e8770a5423ca9aa765e2f8d2c83da69ab80065f33af66
SHA512f48d824065e1d44410c08ce9739b5dcb145f00425b0ed06cb3adc6bc3d1c327faed87225b679eae023ff4325535eb8a27c800ac5e435276f846fe8f1860fe7b0
-
Filesize
6KB
MD56b668312b1fc254abf6998f94b7698ad
SHA1f6f70ca64564c0460bfd433c61d567e2188259fa
SHA25612a5d66b2147569c4bb95fc174dd277b1e9ae75dbc3934075f22bace2246fe06
SHA5124f637f37aa50f2f715a48650e1dfe22dbc36bcee71ac6abd6a3d84a349d6c0bdda591daceab8d981c91a25d1286f0e3d890496ac5243d3424b01bdf12d05a3ee
-
Filesize
185KB
MD5ce6bf425aae7ba0199018f3c39205a7f
SHA16b1ab81a3f6872ba78ff13285c1ff219c31292a7
SHA25687a804eee1662314b699a8178ed8da0fa5be7b07f0205cb81ac3ad9d96a2a01d
SHA5128d7ecb7a2b007a14a6d298ef2976a3f8ad084f4e656d9655ce1650b4e72a11704ad67d7ed9731a6b68b6ed7ee5a19a035db34cc2cb28db46667d1ebce4e0af43