Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 06:43
Behavioral task
behavioral1
Sample
d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe
Resource
win10v2004-20241007-en
General
-
Target
d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe
-
Size
28KB
-
MD5
cfe4317f8ae082b11f49e0d9e00a3190
-
SHA1
153177ea1c157c149b7fa72e90a82b418dec66e5
-
SHA256
d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2
-
SHA512
0774edae4e53c4c8b755060b81ecc5f91691a1da546558338b7eb1506d4d1bd63f5209533180a184524538705a802263b243493e7c2b7386220ba4b8f2e79a8e
-
SSDEEP
384:2/mPAVyp+6srYYCk2gNPapIxcFpOQGR9zos2clAKLHRN74u56/R9zZwu9d:J4quFCk2LMcXOQ69zbjlAAX5e9zT
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 12 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C652778E-72AE-4c13-B980-86094ADDA1A7} {0CD1F184-2429-4100-89F9-175FED760BA6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FA5FDF4F-CF93-460f-9B4B-C8B0E09CE22C} {C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FA5FDF4F-CF93-460f-9B4B-C8B0E09CE22C}\stubpath = "C:\\Windows\\{FA5FDF4F-CF93-460f-9B4B-C8B0E09CE22C}.exe" {C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{69094FFE-C830-476e-AF94-AE7F5BAB1C95} d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2} {69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0CD1F184-2429-4100-89F9-175FED760BA6}\stubpath = "C:\\Windows\\{0CD1F184-2429-4100-89F9-175FED760BA6}.exe" {3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C652778E-72AE-4c13-B980-86094ADDA1A7}\stubpath = "C:\\Windows\\{C652778E-72AE-4c13-B980-86094ADDA1A7}.exe" {0CD1F184-2429-4100-89F9-175FED760BA6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C484297D-EAFD-4d22-AAFE-E75DBC662D44} {C652778E-72AE-4c13-B980-86094ADDA1A7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C484297D-EAFD-4d22-AAFE-E75DBC662D44}\stubpath = "C:\\Windows\\{C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exe" {C652778E-72AE-4c13-B980-86094ADDA1A7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{69094FFE-C830-476e-AF94-AE7F5BAB1C95}\stubpath = "C:\\Windows\\{69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exe" d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}\stubpath = "C:\\Windows\\{3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exe" {69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0CD1F184-2429-4100-89F9-175FED760BA6} {3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exe -
Executes dropped EXE 6 IoCs
pid Process 2860 {69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exe 2572 {3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exe 2668 {0CD1F184-2429-4100-89F9-175FED760BA6}.exe 2300 {C652778E-72AE-4c13-B980-86094ADDA1A7}.exe 1956 {C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exe 2164 {FA5FDF4F-CF93-460f-9B4B-C8B0E09CE22C}.exe -
resource yara_rule behavioral1/memory/2172-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2172-1-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2172-4-0x0000000000320000-0x0000000000332000-memory.dmp upx behavioral1/files/0x0007000000012118-9.dat upx behavioral1/memory/2172-10-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x000800000001707c-18.dat upx behavioral1/memory/2572-19-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2860-20-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x00080000000173f3-30.dat upx behavioral1/memory/2572-31-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x0008000000017400-40.dat upx behavioral1/memory/2300-41-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2668-42-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x000700000001746a-51.dat upx behavioral1/memory/2300-53-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x0007000000017488-62.dat upx behavioral1/memory/1956-63-0x00000000003A0000-0x00000000003B2000-memory.dmp upx behavioral1/memory/1956-64-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\{69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exe d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe File created C:\Windows\{3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exe {69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exe File created C:\Windows\{0CD1F184-2429-4100-89F9-175FED760BA6}.exe {3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exe File created C:\Windows\{C652778E-72AE-4c13-B980-86094ADDA1A7}.exe {0CD1F184-2429-4100-89F9-175FED760BA6}.exe File created C:\Windows\{C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exe {C652778E-72AE-4c13-B980-86094ADDA1A7}.exe File created C:\Windows\{FA5FDF4F-CF93-460f-9B4B-C8B0E09CE22C}.exe {C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exe -
Program crash 6 IoCs
pid pid_target Process procid_target 2312 2172 WerFault.exe 30 2644 2860 WerFault.exe 31 2928 2572 WerFault.exe 33 716 2668 WerFault.exe 35 2560 2300 WerFault.exe 37 2848 1956 WerFault.exe 40 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FA5FDF4F-CF93-460f-9B4B-C8B0E09CE22C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0CD1F184-2429-4100-89F9-175FED760BA6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C652778E-72AE-4c13-B980-86094ADDA1A7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2860 2172 d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe 31 PID 2172 wrote to memory of 2860 2172 d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe 31 PID 2172 wrote to memory of 2860 2172 d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe 31 PID 2172 wrote to memory of 2860 2172 d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe 31 PID 2172 wrote to memory of 2312 2172 d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe 32 PID 2172 wrote to memory of 2312 2172 d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe 32 PID 2172 wrote to memory of 2312 2172 d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe 32 PID 2172 wrote to memory of 2312 2172 d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe 32 PID 2860 wrote to memory of 2572 2860 {69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exe 33 PID 2860 wrote to memory of 2572 2860 {69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exe 33 PID 2860 wrote to memory of 2572 2860 {69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exe 33 PID 2860 wrote to memory of 2572 2860 {69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exe 33 PID 2860 wrote to memory of 2644 2860 {69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exe 34 PID 2860 wrote to memory of 2644 2860 {69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exe 34 PID 2860 wrote to memory of 2644 2860 {69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exe 34 PID 2860 wrote to memory of 2644 2860 {69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exe 34 PID 2572 wrote to memory of 2668 2572 {3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exe 35 PID 2572 wrote to memory of 2668 2572 {3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exe 35 PID 2572 wrote to memory of 2668 2572 {3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exe 35 PID 2572 wrote to memory of 2668 2572 {3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exe 35 PID 2572 wrote to memory of 2928 2572 {3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exe 36 PID 2572 wrote to memory of 2928 2572 {3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exe 36 PID 2572 wrote to memory of 2928 2572 {3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exe 36 PID 2572 wrote to memory of 2928 2572 {3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exe 36 PID 2668 wrote to memory of 2300 2668 {0CD1F184-2429-4100-89F9-175FED760BA6}.exe 37 PID 2668 wrote to memory of 2300 2668 {0CD1F184-2429-4100-89F9-175FED760BA6}.exe 37 PID 2668 wrote to memory of 2300 2668 {0CD1F184-2429-4100-89F9-175FED760BA6}.exe 37 PID 2668 wrote to memory of 2300 2668 {0CD1F184-2429-4100-89F9-175FED760BA6}.exe 37 PID 2668 wrote to memory of 716 2668 {0CD1F184-2429-4100-89F9-175FED760BA6}.exe 38 PID 2668 wrote to memory of 716 2668 {0CD1F184-2429-4100-89F9-175FED760BA6}.exe 38 PID 2668 wrote to memory of 716 2668 {0CD1F184-2429-4100-89F9-175FED760BA6}.exe 38 PID 2668 wrote to memory of 716 2668 {0CD1F184-2429-4100-89F9-175FED760BA6}.exe 38 PID 2300 wrote to memory of 1956 2300 {C652778E-72AE-4c13-B980-86094ADDA1A7}.exe 40 PID 2300 wrote to memory of 1956 2300 {C652778E-72AE-4c13-B980-86094ADDA1A7}.exe 40 PID 2300 wrote to memory of 1956 2300 {C652778E-72AE-4c13-B980-86094ADDA1A7}.exe 40 PID 2300 wrote to memory of 1956 2300 {C652778E-72AE-4c13-B980-86094ADDA1A7}.exe 40 PID 2300 wrote to memory of 2560 2300 {C652778E-72AE-4c13-B980-86094ADDA1A7}.exe 41 PID 2300 wrote to memory of 2560 2300 {C652778E-72AE-4c13-B980-86094ADDA1A7}.exe 41 PID 2300 wrote to memory of 2560 2300 {C652778E-72AE-4c13-B980-86094ADDA1A7}.exe 41 PID 2300 wrote to memory of 2560 2300 {C652778E-72AE-4c13-B980-86094ADDA1A7}.exe 41 PID 1956 wrote to memory of 2164 1956 {C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exe 42 PID 1956 wrote to memory of 2164 1956 {C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exe 42 PID 1956 wrote to memory of 2164 1956 {C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exe 42 PID 1956 wrote to memory of 2164 1956 {C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exe 42 PID 1956 wrote to memory of 2848 1956 {C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exe 43 PID 1956 wrote to memory of 2848 1956 {C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exe 43 PID 1956 wrote to memory of 2848 1956 {C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exe 43 PID 1956 wrote to memory of 2848 1956 {C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe"C:\Users\Admin\AppData\Local\Temp\d557b98d200242aeaa676cbd497e39958cc53be176784cd0fa5ab3765cc13eb2N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\{69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exeC:\Windows\{69094FFE-C830-476e-AF94-AE7F5BAB1C95}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\{3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exeC:\Windows\{3C1A3F7C-0C09-4840-BA1B-2A9BCA3819C2}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\{0CD1F184-2429-4100-89F9-175FED760BA6}.exeC:\Windows\{0CD1F184-2429-4100-89F9-175FED760BA6}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\{C652778E-72AE-4c13-B980-86094ADDA1A7}.exeC:\Windows\{C652778E-72AE-4c13-B980-86094ADDA1A7}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\{C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exeC:\Windows\{C484297D-EAFD-4d22-AAFE-E75DBC662D44}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\{FA5FDF4F-CF93-460f-9B4B-C8B0E09CE22C}.exeC:\Windows\{FA5FDF4F-CF93-460f-9B4B-C8B0E09CE22C}.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 2527⤵
- Program crash
PID:2848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 2526⤵
- Program crash
PID:2560
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 2525⤵
- Program crash
PID:716
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 2524⤵
- Program crash
PID:2928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 2523⤵
- Program crash
PID:2644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 2522⤵
- Program crash
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5729496db2a1443d958fe39cd69fc89b7
SHA1da375fda4d15f96ef4fe2818277eaec4fc44ca39
SHA256eb773fb3fe06445454ab7438d97becca059e4d52f0364a0c91f1acf24834e96f
SHA512c98a4d99699e2ebd34d2814d1852bb5332d3228e99c599cb3bb173cad60bd5696f47c1939918bce5992120319a704fc2a1646f122733084ec3b980d3c1aa8f7d
-
Filesize
28KB
MD543aa74e8d5cf2e320da2697014fea2fb
SHA180c1e3d47f661ef61fc6879a7af1ee08db6d63f8
SHA256244474ce55e2c3b5d73d66c260b53cb3f041843d9721c5c497ca2c84a16c1379
SHA512713ed3ce6ea5f8819274342b000a941e5606b868c6e053e9a3ff211f7fe5303746d0f14cab31eff8cf651827ff36fc93b8be9360345b29bbec6fc76730764f05
-
Filesize
28KB
MD51ce3fea1d20f94c920d454947dccbe00
SHA1fbb2ba001a2ee10d491b4745ea0d03457f749894
SHA256e52fca5d11057c0df5bedc80507dea3653ac9a6508b50972d0f2cb9e2e6a352b
SHA5125f2f4f3350ed0f3a48330e1bdc89d0291e776336fcf0a5a16be8415f7d0e92ad2984bf0292662db35bd8205dacbedd7c6ac5e9eb4c7583b0f6ed1fcce59af953
-
Filesize
28KB
MD56bf5f163f7a04d28c209fffeec272551
SHA1e93d9fa7c904566eb7b7699f44b3f7058787bbf0
SHA2568f247649bf18693c47c0ee83ec3bf1810bcbb91b1562f8cf6a8927f3d7178c56
SHA512e817bffef8b123ceb9ff9c2964c6c23f42ac8a177377d826ea9cd09d29d7cc4357aa2f6ce5fc28fbbbb4bd11fc5551f0d73fee853e9cc60bade848ed9ba10b51
-
Filesize
28KB
MD5677ef87e191930238a1b0c16f6487c06
SHA1ae6311a8ca9877a4e1cb33e3e76ea11dc4a66bc9
SHA256ba21415bd5e02dd5677a3dd6d9e74d449a30e9196cd5ae8eca0da74b9b3fb833
SHA512e623b71aefbde412a761eaa85db3dab523fe8059bf259b80e756707c325df33b0bf55b04da47c506439bbf040606d5d0ad59e5d4e8fe85ddc2ee680903a1e401
-
Filesize
28KB
MD5c7e395227a35e5cc20deffd7c7ec179d
SHA1d3f9d0b11bb748b5416a897bd521ae31e3c9fa02
SHA256a85b8967f31c9d162801d02f9940059ce33152b1e6edbbd14965bf9fbab4dd72
SHA512f14aa5f3bf46c8480caff67af1dbd7014f37953f4c3a31b912b3a4f6d43a23179f6be5e798e1f94d99b7d8ef5d5dd34e9baf4c06fcf8c052dd79193620af5d10