Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 05:24
Static task
static1
Behavioral task
behavioral1
Sample
d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f.exe
Resource
win10v2004-20241007-en
General
-
Target
d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f.exe
-
Size
2.3MB
-
MD5
a031da4bae8bd9cf87c071c94f67d21b
-
SHA1
29146f6e8d3107eb8cc5b362b15d8e57c3f815fb
-
SHA256
d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f
-
SHA512
bd84ac0d0d3a846b5eba97d7a440f79034bda7b381f836966561175e98aed3d87e194441da0a19836c6acb3ec8293970efecb46767f303fd12956a0db9fb0b42
-
SSDEEP
49152:fu0c++OCvkGs9FacSc9fbFtWR1+0o8fyNq6UQruXZO1KgRudguKB+kyo3zJ57O1Y:GB3vkJ9Qc9jFs/QzNDogRudgLB/ySzry
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lecheries.vbs lecheries.exe -
Executes dropped EXE 1 IoCs
pid Process 4556 lecheries.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023bd5-14.dat autoit_exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2376 4556 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lecheries.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2236 d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f.exe 2236 d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f.exe 4556 lecheries.exe 4556 lecheries.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2236 d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f.exe 2236 d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f.exe 4556 lecheries.exe 4556 lecheries.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2236 wrote to memory of 4556 2236 d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f.exe 85 PID 2236 wrote to memory of 4556 2236 d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f.exe 85 PID 2236 wrote to memory of 4556 2236 d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f.exe 85 PID 4556 wrote to memory of 3400 4556 lecheries.exe 86 PID 4556 wrote to memory of 3400 4556 lecheries.exe 86 PID 4556 wrote to memory of 3400 4556 lecheries.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f.exe"C:\Users\Admin\AppData\Local\Temp\d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\konked\lecheries.exe"C:\Users\Admin\AppData\Local\Temp\d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f.exe"3⤵PID:3400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 6723⤵
- Program crash
PID:2376
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4556 -ip 45561⤵PID:320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5dec5b565c13833ae307cb8f290f304f6
SHA1a9adbca3c89cbbab2a4a1b2315ef64b54b0f57f7
SHA256fab1b20589f1a83a562933ea0aa4139effdfc163291d01da5a9ec92fe9e36d83
SHA5120f69ccfbb203cf6fc840277e5c23c5bf71abba73a59421a364357cde2295ca8cc063c3d6302bfbd5947e39ac8c0c2d8fd208fca281d964e92d650f0381c0337a
-
Filesize
2.3MB
MD5a031da4bae8bd9cf87c071c94f67d21b
SHA129146f6e8d3107eb8cc5b362b15d8e57c3f815fb
SHA256d746bf8ebc1bc19872aafe6329fd3865332165c7ef477901e5cdf76e88e9931f
SHA512bd84ac0d0d3a846b5eba97d7a440f79034bda7b381f836966561175e98aed3d87e194441da0a19836c6acb3ec8293970efecb46767f303fd12956a0db9fb0b42