Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
INCENTIVE.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
INCENTIVE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/wslelgm.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/wslelgm.dll
Resource
win10v2004-20241007-en
General
-
Target
INCENTIVE.exe
-
Size
435KB
-
MD5
a8dd9be8f05730b0b3da0aa0524d4041
-
SHA1
585ce6f6c047ae07daf2754cdd9f011f8bb8343b
-
SHA256
d30c25033a8cd080bc76463ad1ef591f61b66b5bf36aae6557d9664714908614
-
SHA512
7a584d294a8702f03ee91f6047c08a9e1ed56742f1a1d19ff9a99778ea5b1270b44d67cf0450fd5e98b75df7d47208e6259efec3c486dfe39e1d5ccd62713dc1
-
SSDEEP
12288:UbLr/1vBE8A8gJ+7rWMtE2bbOu8Nsw+Qw7n/C8c:UTNRWw77tE23Ol+n/C8c
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3936 INCENTIVE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5036 3936 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INCENTIVE.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3936 wrote to memory of 2392 3936 INCENTIVE.exe 83 PID 3936 wrote to memory of 2392 3936 INCENTIVE.exe 83 PID 3936 wrote to memory of 2392 3936 INCENTIVE.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\INCENTIVE.exe"C:\Users\Admin\AppData\Local\Temp\INCENTIVE.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\INCENTIVE.exe"C:\Users\Admin\AppData\Local\Temp\INCENTIVE.exe"2⤵PID:2392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 9122⤵
- Program crash
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3936 -ip 39361⤵PID:4708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303KB
MD57c38758347c69368b8bdff2f7a5ba99c
SHA170c318991c2515844ecc96714f5ad777d2e7e6a7
SHA256fcb8bd3b27beffa5255fbc8b485b038b321043eecd77fc21cf4798446c21a971
SHA5125d04876c8b1dd9a2d691d832471ad650ac85b95503c02aacde848f3b4f6f9f99c861b5a5f8e3e401145e6bbd78f59b8dddc8f24207a52d57afa3efe8940ecdac