Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 05:56
Static task
static1
Behavioral task
behavioral1
Sample
Profoma Invoice _568432.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Profoma Invoice _568432.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
svttgvela.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
svttgvela.exe
Resource
win10v2004-20241007-en
General
-
Target
Profoma Invoice _568432.exe
-
Size
527KB
-
MD5
054e0e3655b99a7bdf021829434d5ef0
-
SHA1
7b263ee8c787e893c776df4a97c3c1076e4d25cd
-
SHA256
27b5c6cd7f2f32176249bd457017b2fc1f021d49cd4b2699c49bf2f2519b60f9
-
SHA512
ed43f425c0d650869eb85c341584d60c2d479265bec770b370056a6ad3bc0828506d17706d248156e2ddc647431f899d49581f74cb267928fdc7c590c1b3cbde
-
SSDEEP
12288:rJSjhrSXUqnZ1olPw5YIMa1TrYRWjgnETy2ZRfW:tFX3foVw5XPnidETba
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4900 svttgvela.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4660 4900 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svttgvela.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Profoma Invoice _568432.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3592 wrote to memory of 4900 3592 Profoma Invoice _568432.exe 82 PID 3592 wrote to memory of 4900 3592 Profoma Invoice _568432.exe 82 PID 3592 wrote to memory of 4900 3592 Profoma Invoice _568432.exe 82 PID 4900 wrote to memory of 5016 4900 svttgvela.exe 84 PID 4900 wrote to memory of 5016 4900 svttgvela.exe 84 PID 4900 wrote to memory of 5016 4900 svttgvela.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Profoma Invoice _568432.exe"C:\Users\Admin\AppData\Local\Temp\Profoma Invoice _568432.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\svttgvela.exeC:\Users\Admin\AppData\Local\Temp\svttgvela.exe C:\Users\Admin\AppData\Local\Temp\oeyxqir2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\svttgvela.exeC:\Users\Admin\AppData\Local\Temp\svttgvela.exe C:\Users\Admin\AppData\Local\Temp\oeyxqir3⤵PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 5283⤵
- Program crash
PID:4660
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4900 -ip 49001⤵PID:3968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD55e5d5c45d6343c13672603095bcb3310
SHA1767e85e7d68e1f2fc39eac3417dd8b011756ad6a
SHA2566a9ae755ba7601f3bc33338f85c76b9c5c1c0f6710b96d01e6f70fdb7211e5f0
SHA5127265cc8c92fddd5553e50ce2c04cd835e7a215816e3c53f6dccf103c91e27be0896fc6cbd45126cf55ca03d8da462f611048e265e87482ba432b9b980afdb419
-
Filesize
5KB
MD5571af5ca739d87a859f150f9b4894057
SHA1905165fbeb2cf556877e3050fc9bfe42081abd20
SHA2560d6a046a8ebb8623da63e94b3792d213c19ff8545d00bee2425b7ef2ba7f515c
SHA5126dc654355195ecc6d88bc13b0c9276d486459139f0c6aa1476f30d0466329bcdcc3ab34999adfc671564fc92fc0208f351712f86856518b9884d7c3e004f5aea
-
Filesize
118KB
MD5c627aca7ccf84f92622c5f83da4190ba
SHA183d7c0310e6e6c97cbdfea8fc0cbd2fee697fb5e
SHA2564c166ca71399d8dd2cc895d0892dbf28ea2b5d883b6e310be7db76cf2d16066b
SHA512465504c77cad06a7047e25aef1b5e351aff88bfea46cb848dc391e782d8c7f535be9379475645264574fe34f302a4d08ac92c801a568b54dd92cc63158cbb3bc