Overview
overview
10Static
static
70da334a11c...60.exe
windows7-x64
81.0.exe
windows7-x64
51AB13RN57.exe
windows7-x64
82009007981...bs.exe
windows7-x64
7302746537.exe
windows7-x64
7319874ec78...c1.exe
windows7-x64
76eec624668...e4.exe
windows7-x64
774c002aafd...a2.exe
windows7-x64
17934625ee2...11.exe
windows7-x64
10Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-07-2024 12:37
Behavioral task
behavioral1
Sample
0da334a11c157f76512e0a02a38744f1d545f52e0605977fe26dad470328c360.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1.0.exe
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
1AB13RN57.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
2009007981Ayon397.4lbs.exe
Resource
win7-20240705-en
Behavioral task
behavioral5
Sample
302746537.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
319874ec782153cdccd2a9f0c5be6ffdb782c9093329851a5ec13530f93b63c1.exe
Resource
win7-20240705-en
Behavioral task
behavioral7
Sample
6eec62466831538bfbf213160269a81ea588fd6ca6cc9a58a92f0c67b124aae4.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
74c002aafd3cdae462c03952adfc266d660fee5aef35a20f222b10de94740da2.exe
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
7934625ee2b46883d287d31cb3d1d0b2eb3a0ac2a59a22d434b16513af3d1b11.exe
Resource
win7-20240705-en
General
-
Target
1.0.exe
-
Size
69KB
-
MD5
248f91bcf92c8bf3e00beb7810de6528
-
SHA1
b67f22eb906669bfc91ab51bb5c7b2b507f12386
-
SHA256
88054efd9231124cb9ca5895608db0004b6a4e734a87bc27b5fb1deb92900306
-
SHA512
5f8ec3dce00d7263f53e1dbaa0ddbcc317f5176952b8561c0e2411c8f3cd9faaebce0780d1410b37dd1df7c4f46c6101c2d7a730834d767c2a9c629d10493a6a
-
SSDEEP
1536:Kvc+XI2Sv/BEEqE+kEnXx0JaFadHUxIcHduph7oGXPX0GO2:Kvc+XDiBViZYdH4IcHoptoo/0Gp
Malware Config
Signatures
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\system\\wallpaper.bmp" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
1.0.execmd.exedescription pid Process procid_target PID 2328 wrote to memory of 1400 2328 1.0.exe 30 PID 2328 wrote to memory of 1400 2328 1.0.exe 30 PID 2328 wrote to memory of 1400 2328 1.0.exe 30 PID 2328 wrote to memory of 1400 2328 1.0.exe 30 PID 2328 wrote to memory of 2424 2328 1.0.exe 31 PID 2328 wrote to memory of 2424 2328 1.0.exe 31 PID 2328 wrote to memory of 2424 2328 1.0.exe 31 PID 2328 wrote to memory of 2424 2328 1.0.exe 31 PID 2424 wrote to memory of 2512 2424 cmd.exe 33 PID 2424 wrote to memory of 2512 2424 cmd.exe 33 PID 2424 wrote to memory of 2512 2424 cmd.exe 33 PID 2424 wrote to memory of 2512 2424 cmd.exe 33 PID 2424 wrote to memory of 2996 2424 cmd.exe 34 PID 2424 wrote to memory of 2996 2424 cmd.exe 34 PID 2424 wrote to memory of 2996 2424 cmd.exe 34 PID 2424 wrote to memory of 2996 2424 cmd.exe 34 PID 2424 wrote to memory of 2288 2424 cmd.exe 35 PID 2424 wrote to memory of 2288 2424 cmd.exe 35 PID 2424 wrote to memory of 2288 2424 cmd.exe 35 PID 2424 wrote to memory of 2288 2424 cmd.exe 35 PID 2424 wrote to memory of 2752 2424 cmd.exe 36 PID 2424 wrote to memory of 2752 2424 cmd.exe 36 PID 2424 wrote to memory of 2752 2424 cmd.exe 36 PID 2424 wrote to memory of 2752 2424 cmd.exe 36 PID 2424 wrote to memory of 2752 2424 cmd.exe 36 PID 2424 wrote to memory of 2752 2424 cmd.exe 36 PID 2424 wrote to memory of 2752 2424 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.0.exe"C:\Users\Admin\AppData\Local\Temp\1.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Documents\GrandiloquentNexus.vbs"2⤵PID:1400
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\Documents\Wallpaper.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Command Processor" /V DisableUNCCheck /T REG_DWORD /F /D 13⤵PID:2512
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\system\wallpaper.bmp"3⤵
- Sets desktop wallpaper using registry
PID:2996
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Control Panel\Desktop" /V WallpaperStyle /T REG_SZ /F /D 23⤵PID:2288
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\System32\RUNDLL32.EXE user32.dll, UpdatePerUserSystemParameters3⤵PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD568c020a705fd94edc0ff215faaa18133
SHA120115b84f33eba2d7cab4021760eb43b76071a2f
SHA256b732afd8dc03b126afa6e7880922408f7b07b3d74f87b72abb865ce666645ebc
SHA512077960a00a6858c51189dad96192984a27c6478761337006bf7d8e2ccf6d79a9e8b92e4dd309decdfafd443150829a42f7fdea372366837860c105f7c3524b62
-
Filesize
484B
MD5065a6e9e68c1a1b05d17d9448e01bddf
SHA184461cda0524dc51bdbc32c4dddf41591f138091
SHA256d1397ff4000e5de00b2be0f97e6f71548ad100cbbc548d6e1c9c94e5bd834a48
SHA512b45cfe8b72c70e9a5b30dee421bd4faabb74ab697971586fa4a4d1be939d3fd7b22995c5cef69d6515a955bc54bae6e28da833e6d163adf49ef6964be6049d07