Analysis
-
max time kernel
93s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 23:05
Static task
static1
Behavioral task
behavioral1
Sample
Commander une image.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Commander une image.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/xkaja.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/xkaja.dll
Resource
win10v2004-20241007-en
General
-
Target
Commander une image.exe
-
Size
419KB
-
MD5
f5a09e2bec2448ffe0f1121af91411ab
-
SHA1
b81e12b89a1d72c90bfe6b5fe95b4b053e0207e6
-
SHA256
90bbdf4e97b2f992340311300e29ce5dd0e8112c6dc681e3354855097eb83ad2
-
SHA512
927216a2a0e9bc9141a0e9d32164b5e85708902fa8d22fe328d4ccecaf7f5bc562c875c330e3fedab8e8ee40d4612bd2d1ad57df2daeb83c0d856ed8bbefbfb4
-
SSDEEP
6144:yGid26cy+QMFCjTOkpNEVMDGFYSM7QABzKNKVQ7i4iOE1u9fUy+z4Cz5qyj:ZzyuCnjDWMxZ7QUup5iO+u9X+z42ME
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3012 Commander une image.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5084 3012 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Commander une image.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2300 3012 Commander une image.exe 85 PID 3012 wrote to memory of 2300 3012 Commander une image.exe 85 PID 3012 wrote to memory of 2300 3012 Commander une image.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Commander une image.exe"C:\Users\Admin\AppData\Local\Temp\Commander une image.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\Commander une image.exe"C:\Users\Admin\AppData\Local\Temp\Commander une image.exe"2⤵PID:2300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 9482⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3012 -ip 30121⤵PID:1800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5e5ff8d9cb45aeff5b05a5a1e54336585
SHA1a2d037bd24fc22f65ab3816ed135f301bd96f051
SHA25654df2592ba748fedb122fc6c4c18172bec40568fc057b1832cdadc808ce22dcc
SHA512e2a0aa236957ca5823bcc9f091a263970621715f85f89bfb78adc5333cafe912db1e51bf00e8e592f08089e91cfe62a71070745f5ed131c1c0c025211c667582