Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 11:54

General

  • Target

    Ref#2600902.exe

  • Size

    51KB

  • MD5

    48d5264b4dca7aa56915e7f378e9ab13

  • SHA1

    e0e384fb1257c17053cddfc24e6a071de6f99f97

  • SHA256

    f9ee3715793db624c00bf0f71624c483729719d0dce15b4922b52f7422a420fc

  • SHA512

    2a3b0b5a0e357217421aa55302d5eea38294a0ad28d9547dafa30fa3f3d01cee6f9588113068f624e5287b4f50d2154123cb83f8f235cb49835f6d11fc9a9e2c

  • SSDEEP

    384:MQc7UaUMrg7ilYqCndq5I16MjSj67WBTc0bhfefTZ2GShq6ki2lKxiIiW1sQS+SG:PEDrgsCKE01f37F2zInyQS+ST6nkC1

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ref#2600902.exe
    "C:\Users\Admin\AppData\Local\Temp\Ref#2600902.exe"
    1⤵
    • Drops startup file
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 1716
      2⤵
      • Program crash
      PID:4700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2688-0-0x000000007491E000-0x000000007491F000-memory.dmp

    Filesize

    4KB

  • memory/2688-1-0x0000000000B90000-0x0000000000BA0000-memory.dmp

    Filesize

    64KB

  • memory/2688-2-0x0000000074910000-0x0000000074FFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2688-3-0x0000000006600000-0x0000000006712000-memory.dmp

    Filesize

    1.1MB

  • memory/2688-5-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-4-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-7-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-9-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-11-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-61-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-13-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-15-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-17-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-19-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-21-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-23-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-25-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-27-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-29-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-31-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-33-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-35-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-37-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-39-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-41-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-43-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-45-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-47-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-49-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-51-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-53-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-55-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-57-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-59-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-67-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-65-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-63-0x0000000006600000-0x000000000670C000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-1326-0x0000000074910000-0x0000000074FFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2688-1327-0x0000000005A60000-0x0000000005ACC000-memory.dmp

    Filesize

    432KB

  • memory/2688-1328-0x0000000005BD0000-0x0000000005C3A000-memory.dmp

    Filesize

    424KB

  • memory/2688-1329-0x0000000000B30000-0x0000000000B7C000-memory.dmp

    Filesize

    304KB

  • memory/2688-1330-0x00000000059D0000-0x0000000005A24000-memory.dmp

    Filesize

    336KB

  • memory/2688-1331-0x000000007491E000-0x000000007491F000-memory.dmp

    Filesize

    4KB

  • memory/2688-1334-0x0000000074910000-0x0000000074FFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2688-1335-0x0000000074910000-0x0000000074FFE000-memory.dmp

    Filesize

    6.9MB