Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 08:52
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/j6m19kru6wpzksw.dll
Resource
win7-20241010-en
General
-
Target
sample.exe
-
Size
459KB
-
MD5
06a466881eb25fe18248221687af6ab3
-
SHA1
17a3c06f08dc5610134292134baa2c4b122e3b98
-
SHA256
f8e9e0ca14f6c6759716590b8880593dc9069d7666adc8ebbbb216e7175a1999
-
SHA512
96b34326e9a8a72ace6c3b584408949f8424caf8d7bcb313a234c1452ee17c814db4277187abd1b15033064d73991bbd6db531b2ba8b0ef8f2d586398fbfbd95
-
SSDEEP
6144:o9X0GbyZbMNeq+B8r2tOVdNOQ+ZyTZt3EMNe0835iP9cMf9A+jbudLGmvtpGsEYl:e00iaeq+8mMteFpiP9jpELGmvtYnYXOs
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3916 sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4004 3916 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3916 wrote to memory of 3652 3916 sample.exe 82 PID 3916 wrote to memory of 3652 3916 sample.exe 82 PID 3916 wrote to memory of 3652 3916 sample.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"2⤵PID:3652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 10802⤵
- Program crash
PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3916 -ip 39161⤵PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5fb719cbb8e619a0a53503d32410c099a
SHA12d6a082ec6171fa00509758b25299278d1944657
SHA2561f1a183a52a36d09ce8611504ee629c7c2ef93ad1b09d32fbf2500441b41d0e6
SHA51268f7d338e41ffade872c8175c0dc62dd296dccd32f9d6308bb0a407c60032877bbd5bff4af7dacbcb3fa023f285ce55935defae750ff7e2108f6ff6f5ab22077