Analysis
-
max time kernel
132s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe
Resource
win10v2004-20250217-en
General
-
Target
1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe
-
Size
62KB
-
MD5
d0961ebbbb96c022100600a224d216fc
-
SHA1
949495ea7e34f9e5859603a6a4887741ce8833cd
-
SHA256
1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538
-
SHA512
5d4e1875dd53f0a58a01f5aff15e9f6395904d9c422f9c84061a6ec99b428cc34bea1591669d064b050e5ed0c456d1a3a643e6c73f03cb1ade3867f17107cac1
-
SSDEEP
768:fQiFq/HBQ/FuktI39dPOsB9kjI41E14grGe76g80MD7q/HBQQQOtZaO7X/RAaabu:4gquFSk3iMD7qVtzDR5aKiBlGKFCB
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1456 set thread context of 3256 1456 1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 312 2248 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2248 winver.exe 2248 winver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 winver.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1456 1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3440 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1456 wrote to memory of 3256 1456 1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe 84 PID 1456 wrote to memory of 3256 1456 1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe 84 PID 1456 wrote to memory of 3256 1456 1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe 84 PID 1456 wrote to memory of 3256 1456 1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe 84 PID 1456 wrote to memory of 3256 1456 1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe 84 PID 1456 wrote to memory of 3256 1456 1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe 84 PID 3256 wrote to memory of 2248 3256 1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe 85 PID 3256 wrote to memory of 2248 3256 1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe 85 PID 3256 wrote to memory of 2248 3256 1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe 85 PID 3256 wrote to memory of 2248 3256 1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe 85 PID 2248 wrote to memory of 3440 2248 winver.exe 56 PID 2248 wrote to memory of 2652 2248 winver.exe 44
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2652
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe"C:\Users\Admin\AppData\Local\Temp\1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe"C:\Users\Admin\AppData\Local\Temp\1c41d403e66b43f22be8ca512e22483be53f4c8ea2061d72279bf94802a58538.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\winver.exewinver4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 3685⤵
- Program crash
PID:312
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2248 -ip 22481⤵PID:4928