Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
wpsnabx64.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
wpsnabx64.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
wpsnabx64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
wpsnabx64.exe
Resource
win11-20240709-en
General
-
Target
wpsnabx64.exe
-
Size
301.7MB
-
MD5
1ffcb04c18a519282d1ff477c18dea91
-
SHA1
05f35ca1c8dde395a9794ed8e1402a31147069ba
-
SHA256
2192a82368f325cae27fc661dde3fb87f02c528744f9d9b4a32d0ab260cbe7e3
-
SHA512
ff2294ab147849066537ccb2f9baa27b7dfd06e696b87341968f646c59284b9dde26b1e988f7ac6c12d57c671f051699f0c37a77c2f076842ef46e17df9a8be7
-
SSDEEP
6291456:imsRnP8rc4xyFbofiNr2VWRPjpAsysZIP8GEEG95nOJ4NxeGodtOpDzDbiLxw:LsPMc40oYr2uPplWPlG9BZniL+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2572 wpsnabx64.tmp -
Loads dropped DLL 1 IoCs
pid Process 2052 wpsnabx64.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpsnabx64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpsnabx64.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2572 wpsnabx64.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2572 2052 wpsnabx64.exe 30 PID 2052 wrote to memory of 2572 2052 wpsnabx64.exe 30 PID 2052 wrote to memory of 2572 2052 wpsnabx64.exe 30 PID 2052 wrote to memory of 2572 2052 wpsnabx64.exe 30 PID 2052 wrote to memory of 2572 2052 wpsnabx64.exe 30 PID 2052 wrote to memory of 2572 2052 wpsnabx64.exe 30 PID 2052 wrote to memory of 2572 2052 wpsnabx64.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\wpsnabx64.exe"C:\Users\Admin\AppData\Local\Temp\wpsnabx64.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\is-VBQCF.tmp\wpsnabx64.tmp"C:\Users\Admin\AppData\Local\Temp\is-VBQCF.tmp\wpsnabx64.tmp" /SL5="$B014E,315180667,899584,C:\Users\Admin\AppData\Local\Temp\wpsnabx64.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5c67166b487e718a51b38816b747652b8
SHA1712cc4f8a5d761bb4c839b60e444f8f0bdc719ab
SHA25661a9c2406eabc25d2440ee4ed737c8137eb53d9bce2be9a4afe72d7acf1ab43e
SHA51260846963a945eabe95461b68895079ed8d546f50fc8bcac1f6aff02c1275c720f74d7ed8e05e712ea57ccc65c34735e54ffdfad2d14e9ba15470359392872327