Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/02/2025, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
General
-
Target
1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41.exe
-
Size
599KB
-
MD5
214b5935a739f12a5760179cd3251c43
-
SHA1
7c2733eca7b957277592a2d92b95cdd81563500e
-
SHA256
1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41
-
SHA512
d4d260e2ca6ebf4997ec8d23bde1d9b0200aac6d6f7f8bbaaa4142037e97e634fb673db6c36e2a63a3aea1e4c10e4ecd9910f90f96b39a0710dc4547807be1b0
-
SSDEEP
12288:ZYAELrvcb3sdCYR5MeJUb5QuHnOlOfk1bbgxL+4+DykgvgsWR:ZYAEXW3sQy5UnOak1bsxAFgvgs
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 2204 1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41.exe 2204 1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41.exe 2204 1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41.exe 2204 1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41.exe 2204 1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41.exe 2204 1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1800 2204 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1800 2204 1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41.exe 31 PID 2204 wrote to memory of 1800 2204 1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41.exe 31 PID 2204 wrote to memory of 1800 2204 1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41.exe 31 PID 2204 wrote to memory of 1800 2204 1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41.exe"C:\Users\Admin\AppData\Local\Temp\1a7d82d7886a4a5005d4577a279ccd72ab94e33ca6c499a0ce9ccc605fd4cf41.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 5322⤵
- Program crash
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36B
MD555d234e670b91b9c21dc00a1336ec7c2
SHA18f4f76a5c30b680ac339b33b23a45957e673b2fb
SHA2563433166ef38dd2c36c552f03b3d73c5549a1d573f23aeb8db2ac81f7746824f3
SHA51295357c5f995c9b198388db033b4e88a32a9d1adac025057db89f8b56f7e271e20ef2f68fa30af4ac93cc94d61f3eba6c0012ef3e45c0a314067a7666acac0fec
-
Filesize
5KB
MD568b287f4067ba013e34a1339afdb1ea8
SHA145ad585b3cc8e5a6af7b68f5d8269c97992130b3
SHA25618e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
SHA51206c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88