Analysis

  • max time kernel
    93s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2024 03:38

General

  • Target

    SKM_C224e2104221317034443434434342244347.exe

  • Size

    254KB

  • MD5

    b312e3f54db0e9ba83b2a454b5de4bf1

  • SHA1

    d5e9f1c71b6fc9b30c61a7267a4b5b032a611c9f

  • SHA256

    6a06e74bde0a136b6d9b96b6093e1fc6d09f78adb6b167adcf82106356de3388

  • SHA512

    5155e3aa8bd6a5c405bfbe92c66ad6e616b6e3c8c07d7ec5a54e09c247f8c3e514696e4104a71903f5f22f38085c68529f1df6eae46cc1edeb89725b76423e8e

  • SSDEEP

    6144:wBlL/chrXUIY+prolgrBh6tikiWFNXiWX8+:Ceh2+prOsz6ckZzSWX8+

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKM_C224e2104221317034443434434342244347.exe
    "C:\Users\Admin\AppData\Local\Temp\SKM_C224e2104221317034443434434342244347.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Local\Temp\SKM_C224e2104221317034443434434342244347.exe
      "C:\Users\Admin\AppData\Local\Temp\SKM_C224e2104221317034443434434342244347.exe"
      2⤵
        PID:656
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 1080
        2⤵
        • Program crash
        PID:1300
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2068 -ip 2068
      1⤵
        PID:392

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\nsqAF0D.tmp\pesaakdq.dll

        Filesize

        33KB

        MD5

        184b758268965aca6018f69dfe7d18d3

        SHA1

        3a25a53a14f5639ff368a33e8ec8a806d059c7eb

        SHA256

        a8d25a38820df99aa1b1be9dce4a30a99ec01c11287fe75cbdf02f8120e4935d

        SHA512

        aca7cee419ed6bd1bfe30f25d1cd59f8a5e98c88ba1c786e3f9b5814fd316d26d7e013ab6b85a475dddd598756ee4f3fea8027dbb693d54f6fd09e094cb65e85

      • memory/2068-7-0x0000000074597000-0x0000000074599000-memory.dmp

        Filesize

        8KB