Analysis
-
max time kernel
30s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 04:06
Behavioral task
behavioral1
Sample
6dd900c1b5b139566a2d74ee10b14020N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6dd900c1b5b139566a2d74ee10b14020N.exe
Resource
win10v2004-20240709-en
General
-
Target
6dd900c1b5b139566a2d74ee10b14020N.exe
-
Size
135KB
-
MD5
6dd900c1b5b139566a2d74ee10b14020
-
SHA1
eac178d28de0effc573c3d368b66510403812d48
-
SHA256
9b4d806580aa4f349f3190cf99e6a73e9d299c222612fb87e7c89adc4eae33bd
-
SHA512
7e1a8ce9b21c43523c2e6574b000a278d613ec97fbfbbb74b4987929d3a0b5b300a87bb596445bda45b80a1a094e5a19cc37131d1ffd41037e012e1200aa9eac
-
SSDEEP
1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SOD:YfU/WF6QMauSuiWNi9eNOl0007NZIOD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1464 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1788 wuauclt.exe -
Loads dropped DLL 1 IoCs
pid Process 1660 6dd900c1b5b139566a2d74ee10b14020N.exe -
resource yara_rule behavioral1/memory/1660-0-0x00000000010A0000-0x00000000010C8000-memory.dmp upx behavioral1/memory/1788-7-0x0000000000A40000-0x0000000000A68000-memory.dmp upx behavioral1/files/0x0008000000015e4e-5.dat upx behavioral1/memory/1660-8-0x00000000010A0000-0x00000000010C8000-memory.dmp upx behavioral1/memory/1660-10-0x00000000010A0000-0x00000000010C8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\wuauclt.exe\" /run" 6dd900c1b5b139566a2d74ee10b14020N.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6dd900c1b5b139566a2d74ee10b14020N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1788 1660 6dd900c1b5b139566a2d74ee10b14020N.exe 28 PID 1660 wrote to memory of 1788 1660 6dd900c1b5b139566a2d74ee10b14020N.exe 28 PID 1660 wrote to memory of 1788 1660 6dd900c1b5b139566a2d74ee10b14020N.exe 28 PID 1660 wrote to memory of 1788 1660 6dd900c1b5b139566a2d74ee10b14020N.exe 28 PID 1660 wrote to memory of 1464 1660 6dd900c1b5b139566a2d74ee10b14020N.exe 31 PID 1660 wrote to memory of 1464 1660 6dd900c1b5b139566a2d74ee10b14020N.exe 31 PID 1660 wrote to memory of 1464 1660 6dd900c1b5b139566a2d74ee10b14020N.exe 31 PID 1660 wrote to memory of 1464 1660 6dd900c1b5b139566a2d74ee10b14020N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dd900c1b5b139566a2d74ee10b14020N.exe"C:\Users\Admin\AppData\Local\Temp\6dd900c1b5b139566a2d74ee10b14020N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\ProgramData\Update\wuauclt.exe"C:\ProgramData\Update\wuauclt.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1788
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\6dd900c1b5b139566a2d74ee10b14020N.exe" >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5fb1f466cbe186e412a1d3e8e99f62a20
SHA11353b16ab69c864c50fc258ccb309706bcf9c2d8
SHA256fb8ff4b5d7267af220f4cbf59936efa7fb8fe740cb53ad47030cc8b2f5689791
SHA512a4f741808b9bfab99de3cc50aebde6ac5a5320a06b645d60a3087668954b1f4433dc37135743966022eee80263754002bdf9c53de5acb58fb622c39321453f71