Analysis
-
max time kernel
94s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
5e642e91516b72121ba30456c103234eaad7895a69929a3b35f0f540a6b8c6c5.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5e642e91516b72121ba30456c103234eaad7895a69929a3b35f0f540a6b8c6c5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
lsyvak.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
lsyvak.exe
Resource
win10v2004-20241007-en
General
-
Target
5e642e91516b72121ba30456c103234eaad7895a69929a3b35f0f540a6b8c6c5.exe
-
Size
241KB
-
MD5
671f622caaaad9137a2eb0663ca0ec70
-
SHA1
f93256448a08355dccb1f3348e435f997a8a2319
-
SHA256
5e642e91516b72121ba30456c103234eaad7895a69929a3b35f0f540a6b8c6c5
-
SHA512
46d9dcd869d919e03c032ea152900f8463298a90cbf598b31c6eb2e6a60c006fd03a2e5114402e69abba84da1dda724226b207a86380746403f315302f394977
-
SSDEEP
6144:rGix6Ah4a/KCdg5GfMF5PPTw1hTbqWDgCKz+/cIGdwxWa:N6S4a/5dxww1hCWDjCyG+n
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4948 lsyvak.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2568 4948 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e642e91516b72121ba30456c103234eaad7895a69929a3b35f0f540a6b8c6c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsyvak.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4536 wrote to memory of 4948 4536 5e642e91516b72121ba30456c103234eaad7895a69929a3b35f0f540a6b8c6c5.exe 84 PID 4536 wrote to memory of 4948 4536 5e642e91516b72121ba30456c103234eaad7895a69929a3b35f0f540a6b8c6c5.exe 84 PID 4536 wrote to memory of 4948 4536 5e642e91516b72121ba30456c103234eaad7895a69929a3b35f0f540a6b8c6c5.exe 84 PID 4948 wrote to memory of 3660 4948 lsyvak.exe 85 PID 4948 wrote to memory of 3660 4948 lsyvak.exe 85 PID 4948 wrote to memory of 3660 4948 lsyvak.exe 85 PID 4948 wrote to memory of 3660 4948 lsyvak.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e642e91516b72121ba30456c103234eaad7895a69929a3b35f0f540a6b8c6c5.exe"C:\Users\Admin\AppData\Local\Temp\5e642e91516b72121ba30456c103234eaad7895a69929a3b35f0f540a6b8c6c5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\lsyvak.exeC:\Users\Admin\AppData\Local\Temp\lsyvak.exe C:\Users\Admin\AppData\Local\Temp\viwmpw2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\lsyvak.exeC:\Users\Admin\AppData\Local\Temp\lsyvak.exe C:\Users\Admin\AppData\Local\Temp\viwmpw3⤵PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 6363⤵
- Program crash
PID:2568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4948 -ip 49481⤵PID:2236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5256a6b52e7a5738716832f1a293648fc
SHA159a8727f230e9f68b296651726fe5befd30dbf85
SHA256a2b67befb327e3bc10a202d73bbbb4d03187d880e2877b6d4f8869284f6e18e3
SHA5120304b68fe55b5ec9fbb0d60f028e9b6c18f06e4a971437736a88dbb48a530363a85a4d2ad1d35b5e50662feec3861a0485bdb352f5b1d8f375c21c71cb15dc4f
-
Filesize
5KB
MD5665da445aa2fbecbaa1750cac3a263a4
SHA148b6e12c571d12c18f44516f74e0548f8289ade2
SHA2561a41e1aec75c713684245dc5235fd61e70d221d01b44a1dd9dc065578bd21670
SHA512722e11f030555c065124034f52d2ce1cf078996b8493d870caa67ff99d9a723fa4a7c9d0bdc6dbd026a38522fb4aefbcf6ec35ffc9bcd013ab357454eefc2169
-
Filesize
4KB
MD5ca134a4293baf2ed6147bd575ad0639b
SHA1a3c93e966d2ab881d5f4e31da82f606b15225bc1
SHA2561b92753015bae55b024807dff0657bcb41c4831ab44d1bd10972310ca181bd14
SHA512958aa23b8ef63131390e9eb5f55244168aa49704f6f9d52554b9d898a80d88cebc2115df85ffea0752cd01232a6976332fc72ae5ffd1a0970d851b692ae5dc26