Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 06:31
Behavioral task
behavioral1
Sample
8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe
Resource
win7-20241010-en
General
-
Target
8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe
-
Size
784KB
-
MD5
e85120ae6e26e400b9e04147908c93f0
-
SHA1
16deafd5efffab3135f85b964a869d84dca61b45
-
SHA256
8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d
-
SHA512
7a14036c9dbc36caf62c00add3d88395256d10abee68759856a896609526acd8c185a3eef9d528b61eeac0b76335f9360388c66df52449e8d1fba373d8e4cd33
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqL0/h7xmPBBAYu9QSUVMvYGSR1VLprLwuiCpcgzR7hY:tthEVaPqLsrgYYBSUevvW13LTX17hSh/
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chordates.vbs chordates.exe -
Executes dropped EXE 1 IoCs
pid Process 1392 chordates.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1840-9-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/1392-15-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/1840-0-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/files/0x0008000000023c15-6.dat upx behavioral2/memory/1840-9-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/1392-15-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4656 1392 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chordates.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1840 8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe 1840 8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe 1392 chordates.exe 1392 chordates.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1840 8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe 1840 8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe 1392 chordates.exe 1392 chordates.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1840 wrote to memory of 1392 1840 8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe 83 PID 1840 wrote to memory of 1392 1840 8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe 83 PID 1840 wrote to memory of 1392 1840 8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe 83 PID 1392 wrote to memory of 4120 1392 chordates.exe 84 PID 1392 wrote to memory of 4120 1392 chordates.exe 84 PID 1392 wrote to memory of 4120 1392 chordates.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe"C:\Users\Admin\AppData\Local\Temp\8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\ferrites\chordates.exe"C:\Users\Admin\AppData\Local\Temp\8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\8465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d.exe"3⤵PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 7483⤵
- Program crash
PID:4656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1392 -ip 13921⤵PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5e85120ae6e26e400b9e04147908c93f0
SHA116deafd5efffab3135f85b964a869d84dca61b45
SHA2568465f963efa6caad72607965a13d45407902ec2bc4648e24c92881a1e40c1e6d
SHA5127a14036c9dbc36caf62c00add3d88395256d10abee68759856a896609526acd8c185a3eef9d528b61eeac0b76335f9360388c66df52449e8d1fba373d8e4cd33