Analysis
-
max time kernel
118s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 00:09
Behavioral task
behavioral1
Sample
3914de8aa3ecf3b70f7771655b620180N.exe
Resource
win7-20240705-en
General
-
Target
3914de8aa3ecf3b70f7771655b620180N.exe
-
Size
44KB
-
MD5
3914de8aa3ecf3b70f7771655b620180
-
SHA1
948c7684983bac80a39b9557dd48d89fb9b6e843
-
SHA256
27c30e6621e5fec718995b0360bd72284c0498da65e4229dbfbf3316d4548c14
-
SHA512
e594c206124c211838d3fc68043765e8506b1141369ca4d2a1991ddc2c25adf8b8facd6a4b3de2c3aeb133f754aa4762b0a5669fc5c4fe0b087aaff211c5e24e
-
SSDEEP
768:kKpu9Tv4A4QfJkwINr8I0SeM5MbRFywB/ZXD5DtZ9bEUWAfAFkY:hc9z4rQfwNr8QeM2biwBx5Dz9bEpAfol
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2064 3914de8aa3ecf3b70f7771655b620180N.exe -
Loads dropped DLL 1 IoCs
pid Process 1516 3914de8aa3ecf3b70f7771655b620180N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3914de8aa3ecf3b70f7771655b620180N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3914de8aa3ecf3b70f7771655b620180N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2172 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1516 wrote to memory of 2064 1516 3914de8aa3ecf3b70f7771655b620180N.exe 30 PID 1516 wrote to memory of 2064 1516 3914de8aa3ecf3b70f7771655b620180N.exe 30 PID 1516 wrote to memory of 2064 1516 3914de8aa3ecf3b70f7771655b620180N.exe 30 PID 1516 wrote to memory of 2064 1516 3914de8aa3ecf3b70f7771655b620180N.exe 30 PID 2064 wrote to memory of 2172 2064 3914de8aa3ecf3b70f7771655b620180N.exe 32 PID 2064 wrote to memory of 2172 2064 3914de8aa3ecf3b70f7771655b620180N.exe 32 PID 2064 wrote to memory of 2172 2064 3914de8aa3ecf3b70f7771655b620180N.exe 32 PID 2064 wrote to memory of 2172 2064 3914de8aa3ecf3b70f7771655b620180N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3914de8aa3ecf3b70f7771655b620180N.exe"C:\Users\Admin\AppData\Local\Temp\3914de8aa3ecf3b70f7771655b620180N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Roaming\XenoManager\3914de8aa3ecf3b70f7771655b620180N.exe"C:\Users\Admin\AppData\Roaming\XenoManager\3914de8aa3ecf3b70f7771655b620180N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Microsoft office service" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDB51.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2172
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5151f4113cb414cb5615256275ba68713
SHA1af54a1512e1c0113d58745d1856a0393f43c4f07
SHA2568865880884854847741f2aa22368f590a96cbc6cf65bf04e7458c66d7e284f98
SHA5129272200b8b09271a82a476acbb2cc50b030dd001de97c7a562efb12279d65bf774f780536d09a89671909678c912f6a28e9360368f9d3b3af55ca97ed45183c2
-
Filesize
44KB
MD53914de8aa3ecf3b70f7771655b620180
SHA1948c7684983bac80a39b9557dd48d89fb9b6e843
SHA25627c30e6621e5fec718995b0360bd72284c0498da65e4229dbfbf3316d4548c14
SHA512e594c206124c211838d3fc68043765e8506b1141369ca4d2a1991ddc2c25adf8b8facd6a4b3de2c3aeb133f754aa4762b0a5669fc5c4fe0b087aaff211c5e24e