Analysis
-
max time kernel
31s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
55495119cd05497d40214c08290b3420N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
55495119cd05497d40214c08290b3420N.exe
Resource
win10v2004-20240709-en
General
-
Target
55495119cd05497d40214c08290b3420N.exe
-
Size
41KB
-
MD5
55495119cd05497d40214c08290b3420
-
SHA1
a6f13ccbda94d85a765da6bf98c28b1a9a6eb7e2
-
SHA256
79e0a66e96102c4fc36fffe0617f42050ebaf1ff736a8644338c61695bd95fb6
-
SHA512
0696a13010393deffd16d25579b5967a3d4a50d64913688314d58bc55dcf86bf8d795598cdb51ec70ee32eeba51c34f5200becc24481ed5b92299307d099b5a4
-
SSDEEP
384:GeprknnLn+Xn+Lnsyjsr+K+B7w1J1C/1HkppfdJdI4Rb2J23GwtCKi5F7:nZIL+X+LsDo7u0SdJ2J2WwtCKi51
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C5E2822D-E683-89B4-E338-91C72A68F46F} 55495119cd05497d40214c08290b3420N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C5E2822D-E683-89B4-E338-91C72A68F46F}\stubpath = "%SystemRoot%\\system32\\vmtoolsd.exe" 55495119cd05497d40214c08290b3420N.exe -
Deletes itself 1 IoCs
pid Process 2732 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\vmtoolsd.exe 55495119cd05497d40214c08290b3420N.exe File opened for modification C:\Windows\SysWOW64\vmtoolsd.exe 55495119cd05497d40214c08290b3420N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55495119cd05497d40214c08290b3420N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1928 55495119cd05497d40214c08290b3420N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1928 wrote to memory of 3060 1928 55495119cd05497d40214c08290b3420N.exe 28 PID 1928 wrote to memory of 3060 1928 55495119cd05497d40214c08290b3420N.exe 28 PID 1928 wrote to memory of 3060 1928 55495119cd05497d40214c08290b3420N.exe 28 PID 1928 wrote to memory of 3060 1928 55495119cd05497d40214c08290b3420N.exe 28 PID 1928 wrote to memory of 2732 1928 55495119cd05497d40214c08290b3420N.exe 30 PID 1928 wrote to memory of 2732 1928 55495119cd05497d40214c08290b3420N.exe 30 PID 1928 wrote to memory of 2732 1928 55495119cd05497d40214c08290b3420N.exe 30 PID 1928 wrote to memory of 2732 1928 55495119cd05497d40214c08290b3420N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\55495119cd05497d40214c08290b3420N.exe"C:\Users\Admin\AppData\Local\Temp\55495119cd05497d40214c08290b3420N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{C5E2822D-E683-89B4-E338-91C72A68F46F}" /f2⤵
- System Location Discovery: System Language Discovery
PID:3060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\554951~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2732
-