Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 08:57
Behavioral task
behavioral1
Sample
451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe
Resource
win10v2004-20241007-en
General
-
Target
451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe
-
Size
28KB
-
MD5
bd1042965381879585e3b38179baa6d0
-
SHA1
e512404359a32704fe3881035488e8f746584f1f
-
SHA256
451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4
-
SHA512
9e11b08ade3d0a488c15862912151847cab8fb7ff08ed9cf5e9dd8940e2a360dcb106144de230937a921c0a52eed1486f4d8fd4637ceea0377e852a481507e6f
-
SSDEEP
384:2/mPAVyp+6srYYCk2gNPapIuFpOQGR9zos2clAKLHRN74u56/R9zZwu9P:J4quFCk2LXXOQ69zbjlAAX5e9zh
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 12 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5898A15E-8B5E-4010-8F2D-F9CB2774BCD9} {E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}\stubpath = "C:\\Windows\\{5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exe" {E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E886A84A-D33B-48b4-AFC3-A6862CF7836E} {EA57BD73-F042-45ae-86A2-1D0320F24316}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E886A84A-D33B-48b4-AFC3-A6862CF7836E}\stubpath = "C:\\Windows\\{E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exe" {EA57BD73-F042-45ae-86A2-1D0320F24316}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B3D0FE04-463A-4ee2-A5D7-7DE58438936D}\stubpath = "C:\\Windows\\{B3D0FE04-463A-4ee2-A5D7-7DE58438936D}.exe" {688EF252-269C-4660-A097-D48755B1BA66}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B3D0FE04-463A-4ee2-A5D7-7DE58438936D} {688EF252-269C-4660-A097-D48755B1BA66}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E371B7E3-E45B-4b94-9868-7156A8A6D7F7} 451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E371B7E3-E45B-4b94-9868-7156A8A6D7F7}\stubpath = "C:\\Windows\\{E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exe" 451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EA57BD73-F042-45ae-86A2-1D0320F24316} {5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EA57BD73-F042-45ae-86A2-1D0320F24316}\stubpath = "C:\\Windows\\{EA57BD73-F042-45ae-86A2-1D0320F24316}.exe" {5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{688EF252-269C-4660-A097-D48755B1BA66} {E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{688EF252-269C-4660-A097-D48755B1BA66}\stubpath = "C:\\Windows\\{688EF252-269C-4660-A097-D48755B1BA66}.exe" {E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exe -
Executes dropped EXE 6 IoCs
pid Process 2740 {E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exe 2440 {5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exe 2596 {EA57BD73-F042-45ae-86A2-1D0320F24316}.exe 1980 {E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exe 3060 {688EF252-269C-4660-A097-D48755B1BA66}.exe 2204 {B3D0FE04-463A-4ee2-A5D7-7DE58438936D}.exe -
resource yara_rule behavioral1/memory/2756-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2756-1-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x0008000000012102-6.dat upx behavioral1/memory/2756-8-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2440-18-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x0004000000004ed7-17.dat upx behavioral1/memory/2740-19-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x0008000000016d1f-28.dat upx behavioral1/memory/2440-30-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x0007000000016d27-39.dat upx behavioral1/memory/2596-41-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x0007000000016d30-50.dat upx behavioral1/memory/1980-51-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x0007000000016d38-61.dat upx behavioral1/memory/3060-62-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\{B3D0FE04-463A-4ee2-A5D7-7DE58438936D}.exe {688EF252-269C-4660-A097-D48755B1BA66}.exe File created C:\Windows\{E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exe 451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe File created C:\Windows\{5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exe {E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exe File created C:\Windows\{EA57BD73-F042-45ae-86A2-1D0320F24316}.exe {5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exe File created C:\Windows\{E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exe {EA57BD73-F042-45ae-86A2-1D0320F24316}.exe File created C:\Windows\{688EF252-269C-4660-A097-D48755B1BA66}.exe {E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exe -
Program crash 6 IoCs
pid pid_target Process procid_target 2836 2756 WerFault.exe 29 2784 2740 WerFault.exe 30 652 2440 WerFault.exe 33 1976 2596 WerFault.exe 35 692 1980 WerFault.exe 37 2312 3060 WerFault.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {688EF252-269C-4660-A097-D48755B1BA66}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B3D0FE04-463A-4ee2-A5D7-7DE58438936D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EA57BD73-F042-45ae-86A2-1D0320F24316}.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2740 2756 451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe 30 PID 2756 wrote to memory of 2740 2756 451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe 30 PID 2756 wrote to memory of 2740 2756 451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe 30 PID 2756 wrote to memory of 2740 2756 451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe 30 PID 2756 wrote to memory of 2836 2756 451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe 31 PID 2756 wrote to memory of 2836 2756 451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe 31 PID 2756 wrote to memory of 2836 2756 451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe 31 PID 2756 wrote to memory of 2836 2756 451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe 31 PID 2740 wrote to memory of 2440 2740 {E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exe 33 PID 2740 wrote to memory of 2440 2740 {E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exe 33 PID 2740 wrote to memory of 2440 2740 {E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exe 33 PID 2740 wrote to memory of 2440 2740 {E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exe 33 PID 2740 wrote to memory of 2784 2740 {E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exe 34 PID 2740 wrote to memory of 2784 2740 {E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exe 34 PID 2740 wrote to memory of 2784 2740 {E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exe 34 PID 2740 wrote to memory of 2784 2740 {E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exe 34 PID 2440 wrote to memory of 2596 2440 {5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exe 35 PID 2440 wrote to memory of 2596 2440 {5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exe 35 PID 2440 wrote to memory of 2596 2440 {5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exe 35 PID 2440 wrote to memory of 2596 2440 {5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exe 35 PID 2440 wrote to memory of 652 2440 {5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exe 36 PID 2440 wrote to memory of 652 2440 {5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exe 36 PID 2440 wrote to memory of 652 2440 {5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exe 36 PID 2440 wrote to memory of 652 2440 {5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exe 36 PID 2596 wrote to memory of 1980 2596 {EA57BD73-F042-45ae-86A2-1D0320F24316}.exe 37 PID 2596 wrote to memory of 1980 2596 {EA57BD73-F042-45ae-86A2-1D0320F24316}.exe 37 PID 2596 wrote to memory of 1980 2596 {EA57BD73-F042-45ae-86A2-1D0320F24316}.exe 37 PID 2596 wrote to memory of 1980 2596 {EA57BD73-F042-45ae-86A2-1D0320F24316}.exe 37 PID 2596 wrote to memory of 1976 2596 {EA57BD73-F042-45ae-86A2-1D0320F24316}.exe 38 PID 2596 wrote to memory of 1976 2596 {EA57BD73-F042-45ae-86A2-1D0320F24316}.exe 38 PID 2596 wrote to memory of 1976 2596 {EA57BD73-F042-45ae-86A2-1D0320F24316}.exe 38 PID 2596 wrote to memory of 1976 2596 {EA57BD73-F042-45ae-86A2-1D0320F24316}.exe 38 PID 1980 wrote to memory of 3060 1980 {E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exe 39 PID 1980 wrote to memory of 3060 1980 {E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exe 39 PID 1980 wrote to memory of 3060 1980 {E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exe 39 PID 1980 wrote to memory of 3060 1980 {E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exe 39 PID 1980 wrote to memory of 692 1980 {E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exe 40 PID 1980 wrote to memory of 692 1980 {E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exe 40 PID 1980 wrote to memory of 692 1980 {E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exe 40 PID 1980 wrote to memory of 692 1980 {E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exe 40 PID 3060 wrote to memory of 2204 3060 {688EF252-269C-4660-A097-D48755B1BA66}.exe 41 PID 3060 wrote to memory of 2204 3060 {688EF252-269C-4660-A097-D48755B1BA66}.exe 41 PID 3060 wrote to memory of 2204 3060 {688EF252-269C-4660-A097-D48755B1BA66}.exe 41 PID 3060 wrote to memory of 2204 3060 {688EF252-269C-4660-A097-D48755B1BA66}.exe 41 PID 3060 wrote to memory of 2312 3060 {688EF252-269C-4660-A097-D48755B1BA66}.exe 42 PID 3060 wrote to memory of 2312 3060 {688EF252-269C-4660-A097-D48755B1BA66}.exe 42 PID 3060 wrote to memory of 2312 3060 {688EF252-269C-4660-A097-D48755B1BA66}.exe 42 PID 3060 wrote to memory of 2312 3060 {688EF252-269C-4660-A097-D48755B1BA66}.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe"C:\Users\Admin\AppData\Local\Temp\451448eaffdd5587f404266c0bae658f061d3b89f26c3ab59170a6c928917cf4N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\{E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exeC:\Windows\{E371B7E3-E45B-4b94-9868-7156A8A6D7F7}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\{5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exeC:\Windows\{5898A15E-8B5E-4010-8F2D-F9CB2774BCD9}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\{EA57BD73-F042-45ae-86A2-1D0320F24316}.exeC:\Windows\{EA57BD73-F042-45ae-86A2-1D0320F24316}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\{E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exeC:\Windows\{E886A84A-D33B-48b4-AFC3-A6862CF7836E}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\{688EF252-269C-4660-A097-D48755B1BA66}.exeC:\Windows\{688EF252-269C-4660-A097-D48755B1BA66}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\{B3D0FE04-463A-4ee2-A5D7-7DE58438936D}.exeC:\Windows\{B3D0FE04-463A-4ee2-A5D7-7DE58438936D}.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 2527⤵
- Program crash
PID:2312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 2526⤵
- Program crash
PID:692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 2525⤵
- Program crash
PID:1976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 2524⤵
- Program crash
PID:652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 2523⤵
- Program crash
PID:2784
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 2522⤵
- Program crash
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD52d7636d51921a2f972f223d12ff03ef0
SHA16be5c4edaedb19c2c344fc0211ebd266cd9f22d6
SHA256e64bb56317b6c19c9a40f4fd20dcdd1a340ff3102f7bde307d0ea83cecf63d78
SHA5121749ddc033687c5651c537ae8e55c40f97cc80524bfa2acad6fcbd948f33ec4282e5a0f590a7f9bfc168f7ff6650198f6e35a851325441413241db3745a84e57
-
Filesize
28KB
MD56af7d1e3b234f266bb6da58866148914
SHA19624b69a6c423337da11affd2205589a51730137
SHA25623dbc2b8f1144b425d064d8bcb589bdebd23bf57d0cf920f255ed1556ddccb4e
SHA5122813f18865ae2f0e360716e52797bd668a9c7c07604f744bb9683636f532f04f4307af52ecdf7a2a27c90c717d766894aeb3f24771bdffa6ba9b4237d62a1944
-
Filesize
28KB
MD5c0e00e941ad019934dfe33c1b2bc48cf
SHA1ee1ed5ddc42c69f2a8aa1dcd6f16f0f50d247aec
SHA256c652a1816d3cf9516f5f35205215ee14137053330c00ff588d6db6adf7a4c944
SHA512228766c53234cbb2d253a2e901ea7dc1adaf266f457259b3c042fefddc83eaf969f7727143eb967bbd7a43bd1ddd22b7f6ad35dfddd1c3fdba4f0fd59b363ff5
-
Filesize
28KB
MD555c0ac60958626271a6be4ec310f87d9
SHA1111e78b48aa190c232610eeb9d3c1f81f98e6e05
SHA2561b6719280278197fe00207370fc538a88c599b8066091c81c24fbe5f0e80c2d8
SHA5129250ab1c45f2074836bc9c92966366bf2228b263733caf76dda267185b1d186336bf748de8e3a284e63013a6f28f27408bc5f6e67540bedafa2aab6b490d32ae
-
Filesize
28KB
MD528519b7b49479c26f0f52d7d781bdc58
SHA1219f83284c35d18ee4b543a8d2041e7fc267c885
SHA2566b4f766618040908eb383b2f66d0b4d242c5f90070a0196c534dbf53c5194e3b
SHA512637c91bbec4aa8ec5643a034a4ef818748373c3ad54470e5c955304147df8e42851945b0d7b0c9b6d87f38d642296f41ef1845668a2896efacac263ba299825a
-
Filesize
28KB
MD5d2e2a51ad83b36beb12ed2f905afded1
SHA12139f5bfed6fc22527c66c4c83e36482f1a7b6a5
SHA2564d749b77fe1568419cc680043c95eab92184fa6d9358fbb13bad04418e1194c1
SHA512ade1db0e792c17b3d462f2f28af2bae03951f813fa9ccf00ae395b2b812a757aa62a61b909152bfd564886cca85533108f05344c523a5f00ba751841fe04b18a