Analysis

  • max time kernel
    93s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2024 01:14

General

  • Target

    Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe

  • Size

    258KB

  • MD5

    1ec9c287f61dee3f7cee2dc216e8596f

  • SHA1

    2ce2bc72b3245447687fddc717dbc087573e9422

  • SHA256

    0112b086f601e1d8a6d10ce4e798dd5eaf379127cb99d5a4b4f44ec708457ffd

  • SHA512

    74568e623eec50754c1a0cf3e2db27e120777f8c80a80df94fac6f106b5b43d7a8a0f9b5375f86bdbc8122d49eac2127bb9167f2e6a7d658f2e9302fe8ab69e5

  • SSDEEP

    6144:mbE/HUba5PBYCt37k0AUck3UcrhNQxy7bjTRuFsC42TjKoagrM0:mb/aLPtLk9rkEcrkxey82TjKzyp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe
    "C:\Users\Admin\AppData\Local\Temp\Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe
      "C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:988
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 560
        3⤵
        • Program crash
        PID:3416
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 988 -ip 988
    1⤵
      PID:3116

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bsdyoglyqor.r

      Filesize

      185KB

      MD5

      1e4e5fe5153c59256f6178ac541e53d0

      SHA1

      1ca49ca82dc80310e017f1d7be8c1e36eba01d24

      SHA256

      1f68a8c3efb02d3cefb6e49d8dba71acb16bbeaaa1686913120ad42d2991626a

      SHA512

      98e8d172d897a16cc7ca47c1e9d9b91f36b16a48733ab6c4d79169d7ec72416ccb341c9474fbe56dec4c39f3f5ad31b7bd4611aaa00cc8786640c4bc56bf8ec1

    • C:\Users\Admin\AppData\Local\Temp\dwvjvng.jan

      Filesize

      4KB

      MD5

      bf9a3bdedbd39546a400d1cd1850b4aa

      SHA1

      c915bb9ad5ce4defd8c5cfee4433d1dde789120c

      SHA256

      6830feee189372fd3145f58ce1a7c38203b5ac35b326446980c607bfe129c355

      SHA512

      117d5bb80f1a12abff70d8979abb19a6ec7a5dfa9c87e307b4defcfefde36d99c031efba4455824ce2243ef5726d784f2aae99915966282b5a341dc063345d4b

    • C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe

      Filesize

      59KB

      MD5

      60ebe600e2d67c0877426dfd53be96d7

      SHA1

      83c0f3f77bec5df19f20ab0706ca736bd5e6e0d6

      SHA256

      fad978413cf6a36fbd03d3c96a5a08d0cf227e17710abddc06e73ae1913de648

      SHA512

      f0e2839211d84f2247a654f51ff07fe4c89f3d9ed71558e34479d8afe08aa9f606a65d1e53eaa0bea8287537de8f7e50427402f33a0339739b4dff7405a127eb

    • memory/988-8-0x0000000001160000-0x0000000001162000-memory.dmp

      Filesize

      8KB