Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 04:19
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe
Resource
win7-20240708-en
11 signatures
120 seconds
General
-
Target
6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe
-
Size
1.7MB
-
MD5
6fb8d9b8faf429fd1ac72fe9e8e2acb0
-
SHA1
749e3438eeba8dd45820fff71946891d5c37e9e5
-
SHA256
b33a30ae9ed33c83e82f513ae9c0c8daa332b91488ededdb45068498e11c30e1
-
SHA512
70b2c15918e6ee64b98aabbaa000e8f9364870e5adf36f5c9f33e41f3e3f9738843dd8e5467a2e2722352d8f4cfc269e5342012d92150b60112a0962e6d555b9
-
SSDEEP
24576:Etb20pkfCqT5TBWgNQ7aWS6aWTtVXVChV1SzCaJWN7W6AA:tCg5tQ7aCbTvEhVgGaJ8q5A
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcmgr.org.url 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe -
resource yara_rule behavioral1/memory/2928-4-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2928-6-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2928-5-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2928-7-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2928-17-0x0000000000400000-0x000000000046C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 2928 MSBuild.exe 2928 MSBuild.exe 2928 MSBuild.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2928 MSBuild.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2928 MSBuild.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2668 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 30 PID 1716 wrote to memory of 2668 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 30 PID 1716 wrote to memory of 2668 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 30 PID 1716 wrote to memory of 2668 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 30 PID 1716 wrote to memory of 2928 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 31 PID 1716 wrote to memory of 2928 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 31 PID 1716 wrote to memory of 2928 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 31 PID 1716 wrote to memory of 2928 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 31 PID 1716 wrote to memory of 2928 1716 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe"C:\Users\Admin\AppData\Local\Temp\6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe"2⤵PID:2668
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2928
-