Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 06:46
Behavioral task
behavioral1
Sample
70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe
Resource
win10v2004-20241007-en
General
-
Target
70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe
-
Size
28KB
-
MD5
f284ea6cbc01384673733702d26540ce
-
SHA1
19534d5826f0bed9844d7236cde79bae54b59caa
-
SHA256
70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9
-
SHA512
13358b816cb883680af765ad1e1f7f6baa1356c40395d9a11dfd8a610171bbe3aeb52790f8c66277b5ee798746fe28984d7ecac86c621952d3e39c0295387283
-
SSDEEP
384:2/mPAVyp+6srYYCk2gNPapIyFpOQGR9zos2clAKLHRN74u56/R9zZwu91:J4quFCk2LXXOQ69zbjlAAX5e9z7
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 12 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38455CD0-E3AC-4856-91A3-1A8F4213E5E4} 70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{74777BA8-D93F-4965-BC6E-4A13A79877FB} {38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{74777BA8-D93F-4965-BC6E-4A13A79877FB}\stubpath = "C:\\Windows\\{74777BA8-D93F-4965-BC6E-4A13A79877FB}.exe" {38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E2B681B-A481-4772-A6F7-E3A532A04871}\stubpath = "C:\\Windows\\{8E2B681B-A481-4772-A6F7-E3A532A04871}.exe" {74777BA8-D93F-4965-BC6E-4A13A79877FB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{42EDF496-7B76-41b9-B48E-4F8A42FF46E8}\stubpath = "C:\\Windows\\{42EDF496-7B76-41b9-B48E-4F8A42FF46E8}.exe" {4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38455CD0-E3AC-4856-91A3-1A8F4213E5E4}\stubpath = "C:\\Windows\\{38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exe" 70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E2B681B-A481-4772-A6F7-E3A532A04871} {74777BA8-D93F-4965-BC6E-4A13A79877FB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646} {8E2B681B-A481-4772-A6F7-E3A532A04871}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}\stubpath = "C:\\Windows\\{D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exe" {8E2B681B-A481-4772-A6F7-E3A532A04871}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B} {D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}\stubpath = "C:\\Windows\\{4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exe" {D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{42EDF496-7B76-41b9-B48E-4F8A42FF46E8} {4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exe -
Executes dropped EXE 6 IoCs
pid Process 2328 {38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exe 780 {74777BA8-D93F-4965-BC6E-4A13A79877FB}.exe 2108 {8E2B681B-A481-4772-A6F7-E3A532A04871}.exe 2940 {D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exe 884 {4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exe 2216 {42EDF496-7B76-41b9-B48E-4F8A42FF46E8}.exe -
resource yara_rule behavioral1/memory/2900-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2900-1-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x000b0000000120f6-8.dat upx behavioral1/memory/2900-9-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x0008000000015e48-18.dat upx behavioral1/memory/780-19-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2328-20-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x0004000000004ed7-30.dat upx behavioral1/memory/2108-31-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/780-32-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x0007000000015ec9-41.dat upx behavioral1/memory/2108-43-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x0007000000015f71-52.dat upx behavioral1/memory/2940-53-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x0007000000016101-62.dat upx behavioral1/memory/884-63-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\{D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exe {8E2B681B-A481-4772-A6F7-E3A532A04871}.exe File created C:\Windows\{4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exe {D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exe File created C:\Windows\{42EDF496-7B76-41b9-B48E-4F8A42FF46E8}.exe {4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exe File created C:\Windows\{38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exe 70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe File created C:\Windows\{74777BA8-D93F-4965-BC6E-4A13A79877FB}.exe {38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exe File created C:\Windows\{8E2B681B-A481-4772-A6F7-E3A532A04871}.exe {74777BA8-D93F-4965-BC6E-4A13A79877FB}.exe -
Program crash 6 IoCs
pid pid_target Process procid_target 2644 2900 WerFault.exe 29 696 2328 WerFault.exe 30 1204 780 WerFault.exe 33 2104 2108 WerFault.exe 35 1296 2940 WerFault.exe 37 2304 884 WerFault.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {42EDF496-7B76-41b9-B48E-4F8A42FF46E8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {74777BA8-D93F-4965-BC6E-4A13A79877FB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8E2B681B-A481-4772-A6F7-E3A532A04871}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2328 2900 70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe 30 PID 2900 wrote to memory of 2328 2900 70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe 30 PID 2900 wrote to memory of 2328 2900 70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe 30 PID 2900 wrote to memory of 2328 2900 70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe 30 PID 2900 wrote to memory of 2644 2900 70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe 31 PID 2900 wrote to memory of 2644 2900 70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe 31 PID 2900 wrote to memory of 2644 2900 70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe 31 PID 2900 wrote to memory of 2644 2900 70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe 31 PID 2328 wrote to memory of 780 2328 {38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exe 33 PID 2328 wrote to memory of 780 2328 {38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exe 33 PID 2328 wrote to memory of 780 2328 {38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exe 33 PID 2328 wrote to memory of 780 2328 {38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exe 33 PID 2328 wrote to memory of 696 2328 {38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exe 34 PID 2328 wrote to memory of 696 2328 {38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exe 34 PID 2328 wrote to memory of 696 2328 {38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exe 34 PID 2328 wrote to memory of 696 2328 {38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exe 34 PID 780 wrote to memory of 2108 780 {74777BA8-D93F-4965-BC6E-4A13A79877FB}.exe 35 PID 780 wrote to memory of 2108 780 {74777BA8-D93F-4965-BC6E-4A13A79877FB}.exe 35 PID 780 wrote to memory of 2108 780 {74777BA8-D93F-4965-BC6E-4A13A79877FB}.exe 35 PID 780 wrote to memory of 2108 780 {74777BA8-D93F-4965-BC6E-4A13A79877FB}.exe 35 PID 780 wrote to memory of 1204 780 {74777BA8-D93F-4965-BC6E-4A13A79877FB}.exe 36 PID 780 wrote to memory of 1204 780 {74777BA8-D93F-4965-BC6E-4A13A79877FB}.exe 36 PID 780 wrote to memory of 1204 780 {74777BA8-D93F-4965-BC6E-4A13A79877FB}.exe 36 PID 780 wrote to memory of 1204 780 {74777BA8-D93F-4965-BC6E-4A13A79877FB}.exe 36 PID 2108 wrote to memory of 2940 2108 {8E2B681B-A481-4772-A6F7-E3A532A04871}.exe 37 PID 2108 wrote to memory of 2940 2108 {8E2B681B-A481-4772-A6F7-E3A532A04871}.exe 37 PID 2108 wrote to memory of 2940 2108 {8E2B681B-A481-4772-A6F7-E3A532A04871}.exe 37 PID 2108 wrote to memory of 2940 2108 {8E2B681B-A481-4772-A6F7-E3A532A04871}.exe 37 PID 2108 wrote to memory of 2104 2108 {8E2B681B-A481-4772-A6F7-E3A532A04871}.exe 38 PID 2108 wrote to memory of 2104 2108 {8E2B681B-A481-4772-A6F7-E3A532A04871}.exe 38 PID 2108 wrote to memory of 2104 2108 {8E2B681B-A481-4772-A6F7-E3A532A04871}.exe 38 PID 2108 wrote to memory of 2104 2108 {8E2B681B-A481-4772-A6F7-E3A532A04871}.exe 38 PID 2940 wrote to memory of 884 2940 {D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exe 39 PID 2940 wrote to memory of 884 2940 {D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exe 39 PID 2940 wrote to memory of 884 2940 {D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exe 39 PID 2940 wrote to memory of 884 2940 {D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exe 39 PID 2940 wrote to memory of 1296 2940 {D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exe 40 PID 2940 wrote to memory of 1296 2940 {D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exe 40 PID 2940 wrote to memory of 1296 2940 {D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exe 40 PID 2940 wrote to memory of 1296 2940 {D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exe 40 PID 884 wrote to memory of 2216 884 {4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exe 41 PID 884 wrote to memory of 2216 884 {4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exe 41 PID 884 wrote to memory of 2216 884 {4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exe 41 PID 884 wrote to memory of 2216 884 {4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exe 41 PID 884 wrote to memory of 2304 884 {4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exe 42 PID 884 wrote to memory of 2304 884 {4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exe 42 PID 884 wrote to memory of 2304 884 {4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exe 42 PID 884 wrote to memory of 2304 884 {4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe"C:\Users\Admin\AppData\Local\Temp\70bdf2285b80ba0a78fc701d79543b6d4bbafc329a5aa3ac903673b2bc56cfb9.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\{38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exeC:\Windows\{38455CD0-E3AC-4856-91A3-1A8F4213E5E4}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\{74777BA8-D93F-4965-BC6E-4A13A79877FB}.exeC:\Windows\{74777BA8-D93F-4965-BC6E-4A13A79877FB}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\{8E2B681B-A481-4772-A6F7-E3A532A04871}.exeC:\Windows\{8E2B681B-A481-4772-A6F7-E3A532A04871}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\{D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exeC:\Windows\{D8E3A2F9-A9B2-42f4-8DCE-838E9C69E646}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\{4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exeC:\Windows\{4CEF416F-9C0C-4bc4-8F9A-C6FBD2415E8B}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\{42EDF496-7B76-41b9-B48E-4F8A42FF46E8}.exeC:\Windows\{42EDF496-7B76-41b9-B48E-4F8A42FF46E8}.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 884 -s 2527⤵
- Program crash
PID:2304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 2526⤵
- Program crash
PID:1296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 2525⤵
- Program crash
PID:2104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 780 -s 2524⤵
- Program crash
PID:1204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2328 -s 2523⤵
- Program crash
PID:696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 2522⤵
- Program crash
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5ea9e18c94879710d2ff1db79fd2d57dc
SHA11579c280e1684ca97e3b33b209aae5636e58b2c8
SHA256c917f9c67e546458d49ea7c801ea2b71308211e8962c09d7ffd6b8bd3826d1e3
SHA5128f981b66e49b14ac854b7e78b567fd09c043bc2febfe6dc68448ed0b346cb6027204b8179b351cbb8d01280f71d65f673a70a308877740083f2260c14a924cf0
-
Filesize
28KB
MD5faed142b7f50023000a6f005d319b7b3
SHA188f8beec434486b6939f5aa5f0af1665db9d987a
SHA25695b6b24dfbb2678f79bb83e5c176ba30a7c327baf27dc98a4f8c90d6953735da
SHA51220ec1109adc886fdf8ee48d9e649f3304be09cdba845945edb89b5343af1b0cd25e6223c43af8ec94ce7b97cd48ed77153d68346a0fd3a69bcf547639fa4e14b
-
Filesize
28KB
MD51416b281a58308466ebfc067af344d0a
SHA13a4ac11b61d4cc2dea75337d18b891a73d6df1a9
SHA25622f2c7c8c3df056cdf72f16717f0ca43504321179f5455ad83cbc12993a08237
SHA5123ca71baf19d4cc4b1ab009b48025e6ea2cb7a2adfd0f086cacb829eb011a6043ee8fbb1300a6e9521682c8845530d6bc7c0232172c89690244de967a50f28918
-
Filesize
28KB
MD54732cef595427b79411f4336b34d3042
SHA1b3bc9bb545f43972941efcef945f86a691562913
SHA25611f75327a63773f1e24c0b7376e79b398cd4c22a37efb40e02829da1f242d1f4
SHA5127f74b61259916d0146d506e23842c57dd3a4ce55dce290cd9aafd765e24dabe894499e641148c370f557776a0a93e9d5a298728773c4d9688b3a376be7205f91
-
Filesize
28KB
MD54419c75fd9308d917848da0c2a85e159
SHA14d5bde11f0c982c9f2a91516df689f8639bcb971
SHA25649172519d6e6c3bbb55abfb95a10c5e49c4f41dca79dc278e59b9c548cffa01a
SHA512c92ef4476fc6d585e72a387b5c1e76ae757b9a46a40a57502787180bf896023e94747a97a4bd2367a9f9048e512676f43ede1f07bfbee8fb0da205fecac0e231
-
Filesize
28KB
MD5567edef012f98a45273f70156e51105d
SHA1ab974fe3eb2ca4a8bc7798d857f14fef7c96e68d
SHA25638f018985320c3d3e55aa247f195c4075de15f7030ad1a8ae08ba305d73ecba2
SHA51268fc8f6db6696758313737c5fb8c5bc0d2781918d8691743cc26af77fc3c2d69e5ce6b2e14d3f80f2e2e1b663bdd42c7c1578a9ef39076221be42998c42c8167