Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 04:57
Behavioral task
behavioral1
Sample
INQ8593.exe
Resource
win7-20240903-en
General
-
Target
INQ8593.exe
-
Size
689KB
-
MD5
a23fbcbae306780f4c604238423ffc5c
-
SHA1
28f95c0f8ad0c220549a529dd993b234d8e4a053
-
SHA256
6f1865688d1744c4b955e994613d042146f366732e420290da38623c23a24fd1
-
SHA512
79311359d95217a2c91fb8ff5020bb053e3c761a9198ac6901505d3fbd70eb4308e5644b1673ce5808c748b16b71a29d600b339020b658f8cd33e376f89a4d7a
-
SSDEEP
12288:oXe9PPlowWX0t6mOQwg1Qd15CcYk0We1nF0uxjFhHgoYokcXkfT4/9c:lhloDX0XOf4vYpc+Gy
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3980-11-0x0000000000400000-0x0000000000588000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/3980-0-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3980-11-0x0000000000400000-0x0000000000588000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2280 3980 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INQ8593.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3980 wrote to memory of 3676 3980 INQ8593.exe 82 PID 3980 wrote to memory of 3676 3980 INQ8593.exe 82 PID 3980 wrote to memory of 3676 3980 INQ8593.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\INQ8593.exe"C:\Users\Admin\AppData\Local\Temp\INQ8593.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\INQ8593.exe"C:\Users\Admin\AppData\Local\Temp\INQ8593.exe"2⤵PID:3676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 7642⤵
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3980 -ip 39801⤵PID:3904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218KB
MD52ed5f45a495a567b60c13dd4f63955b6
SHA1425eb94d866fb43d991ae00091c03ac984f11664
SHA256664c717982430dfc67ddad302f818f0b4c15e85a557a7417c864979cbe01d3d3
SHA512f387a5e945a0b4adfbf931867acca50c89f8460388351d0b944b61b712c03b3819824ea2746f13daf6a38a91bc2f463ad4c284644ef2d5518603c80a68a14a24