Analysis
-
max time kernel
20s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
6c750c3a7df545a571798358033800c0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6c750c3a7df545a571798358033800c0N.exe
Resource
win10v2004-20240709-en
General
-
Target
6c750c3a7df545a571798358033800c0N.exe
-
Size
490KB
-
MD5
6c750c3a7df545a571798358033800c0
-
SHA1
991a698e8a391b285919b3634c864b0fe76d9af0
-
SHA256
d13d58196e4857bde99556a13571abf50557b3bfa46d09d1029241679dff2915
-
SHA512
ef6c86c8d2097aa3506a0b3cba4bf7f4484bd6d850383b5950456c9003e50723133c53e8a07e92704fa68eae809c4eac3af1647e434aa95676cca1de2cbfe234
-
SSDEEP
12288:X+TRL7A0wg5rYzCm4juSIBS2RVFW4P6gr646b19mmVG:X+17A0wRs92V1By6mVG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2476 s2754.exe -
Loads dropped DLL 4 IoCs
pid Process 1996 6c750c3a7df545a571798358033800c0N.exe 1996 6c750c3a7df545a571798358033800c0N.exe 1996 6c750c3a7df545a571798358033800c0N.exe 1996 6c750c3a7df545a571798358033800c0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c750c3a7df545a571798358033800c0N.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1996 6c750c3a7df545a571798358033800c0N.exe 1996 6c750c3a7df545a571798358033800c0N.exe 2476 s2754.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2476 s2754.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2476 s2754.exe 2476 s2754.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2476 1996 6c750c3a7df545a571798358033800c0N.exe 29 PID 1996 wrote to memory of 2476 1996 6c750c3a7df545a571798358033800c0N.exe 29 PID 1996 wrote to memory of 2476 1996 6c750c3a7df545a571798358033800c0N.exe 29 PID 1996 wrote to memory of 2476 1996 6c750c3a7df545a571798358033800c0N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c750c3a7df545a571798358033800c0N.exe"C:\Users\Admin\AppData\Local\Temp\6c750c3a7df545a571798358033800c0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\n2754\s2754.exe"C:\Users\Admin\AppData\Local\Temp\n2754\s2754.exe" ins.exe /e11987670 /u4dc90cd0-7328-42b2-8f65-20295bc06f262⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD5ad76cab590ec4c1d3008589d2d2eb052
SHA13fd9b837fd4a078411c0958a41b1adb321e1016a
SHA256a2111f7d4b36800e840b63573fcb044ea18fb4bc3fef2b8f2724d0d4b5e6c51a
SHA512b8f6695a4c4c18046fb3da55f5c6d1fd60b4e90d8952bceb27296da1a522a97a829494bab103375595a599c602d337926270f2422401678af8d5393490e53432