Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2024, 11:45
Behavioral task
behavioral1
Sample
5a89a43a497faf2152cc5b8ecda8bb6c84d047e4fd53418ed78fa5f73cd69e79.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5a89a43a497faf2152cc5b8ecda8bb6c84d047e4fd53418ed78fa5f73cd69e79.exe
Resource
win10v2004-20241007-en
General
-
Target
5a89a43a497faf2152cc5b8ecda8bb6c84d047e4fd53418ed78fa5f73cd69e79.exe
-
Size
1.2MB
-
MD5
635afddc2a93e6fa556d320431a70668
-
SHA1
854ac114dcb8b00f0538db3ed76c8c7b1a381f14
-
SHA256
5a89a43a497faf2152cc5b8ecda8bb6c84d047e4fd53418ed78fa5f73cd69e79
-
SHA512
edbeac6dd1ae291e2335e6fdc28b209b7c0b9e2124d13616ea68936d25e336ab71f6e48d6e9f461cdacec21b3fa1deefb51e094d0e2a2f44c69a93d5711a9b7b
-
SSDEEP
24576:6Ds4JwTnl1mEiWKlNsmqDpyOnDlcCqaF5Q:6DYnTiWz0QcCq
Malware Config
Signatures
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5036 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3004 5020 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a89a43a497faf2152cc5b8ecda8bb6c84d047e4fd53418ed78fa5f73cd69e79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeRestorePrivilege 5020 5a89a43a497faf2152cc5b8ecda8bb6c84d047e4fd53418ed78fa5f73cd69e79.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5020 5a89a43a497faf2152cc5b8ecda8bb6c84d047e4fd53418ed78fa5f73cd69e79.exe 5020 5a89a43a497faf2152cc5b8ecda8bb6c84d047e4fd53418ed78fa5f73cd69e79.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5020 wrote to memory of 4880 5020 5a89a43a497faf2152cc5b8ecda8bb6c84d047e4fd53418ed78fa5f73cd69e79.exe 83 PID 5020 wrote to memory of 4880 5020 5a89a43a497faf2152cc5b8ecda8bb6c84d047e4fd53418ed78fa5f73cd69e79.exe 83 PID 5020 wrote to memory of 4880 5020 5a89a43a497faf2152cc5b8ecda8bb6c84d047e4fd53418ed78fa5f73cd69e79.exe 83 PID 4880 wrote to memory of 5036 4880 cmd.exe 85 PID 4880 wrote to memory of 5036 4880 cmd.exe 85 PID 4880 wrote to memory of 5036 4880 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a89a43a497faf2152cc5b8ecda8bb6c84d047e4fd53418ed78fa5f73cd69e79.exe"C:\Users\Admin\AppData\Local\Temp\5a89a43a497faf2152cc5b8ecda8bb6c84d047e4fd53418ed78fa5f73cd69e79.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\cmd.execmd /c sc config "UxSms" start= demand2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\sc.exesc config "UxSms" start= demand3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 6242⤵
- Program crash
PID:3004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5020 -ip 50201⤵PID:5052