Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 10:01
Behavioral task
behavioral1
Sample
bd7f21a62bf8e280aa35af88f8c62c20N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd7f21a62bf8e280aa35af88f8c62c20N.exe
Resource
win10v2004-20240709-en
General
-
Target
bd7f21a62bf8e280aa35af88f8c62c20N.exe
-
Size
111KB
-
MD5
bd7f21a62bf8e280aa35af88f8c62c20
-
SHA1
b8835f327eb8fbbcb4015b62162b7ac3c386956c
-
SHA256
857de405df42c47dc13015d8804ffc4c60db8068388c616d8997e5428fe6aad0
-
SHA512
20667a8c0b8e993cadaf9624da637bf10e9bc70c40692273b070b1971372fa6d20a7c9648d7b57e3a995a9b13492a7e7db3788d71286241ac8fb4708d336a398
-
SSDEEP
1536:ELNIW39SaZTbFARlq7jC1OZstZu0TSVEdUJWTWd18f9:ELlbZTZX3BAtTSVEdUJWTWd18f9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2364 guifx.exe -
Loads dropped DLL 1 IoCs
pid Process 2532 bd7f21a62bf8e280aa35af88f8c62c20N.exe -
resource yara_rule behavioral1/memory/2532-0-0x00000000001B0000-0x00000000001CC000-memory.dmp upx behavioral1/files/0x0008000000016d19-5.dat upx behavioral1/memory/2364-7-0x0000000000820000-0x000000000083C000-memory.dmp upx behavioral1/memory/2364-9-0x0000000000820000-0x000000000083C000-memory.dmp upx behavioral1/memory/2532-10-0x00000000001B0000-0x00000000001CC000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Graphics = "\"C:\\ProgramData\\Graphics\\guifx.exe\" /run" bd7f21a62bf8e280aa35af88f8c62c20N.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd7f21a62bf8e280aa35af88f8c62c20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language guifx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2364 2532 bd7f21a62bf8e280aa35af88f8c62c20N.exe 30 PID 2532 wrote to memory of 2364 2532 bd7f21a62bf8e280aa35af88f8c62c20N.exe 30 PID 2532 wrote to memory of 2364 2532 bd7f21a62bf8e280aa35af88f8c62c20N.exe 30 PID 2532 wrote to memory of 2364 2532 bd7f21a62bf8e280aa35af88f8c62c20N.exe 30 PID 2532 wrote to memory of 2748 2532 bd7f21a62bf8e280aa35af88f8c62c20N.exe 32 PID 2532 wrote to memory of 2748 2532 bd7f21a62bf8e280aa35af88f8c62c20N.exe 32 PID 2532 wrote to memory of 2748 2532 bd7f21a62bf8e280aa35af88f8c62c20N.exe 32 PID 2532 wrote to memory of 2748 2532 bd7f21a62bf8e280aa35af88f8c62c20N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd7f21a62bf8e280aa35af88f8c62c20N.exe"C:\Users\Admin\AppData\Local\Temp\bd7f21a62bf8e280aa35af88f8c62c20N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\ProgramData\Graphics\guifx.exe"C:\ProgramData\Graphics\guifx.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2364
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\bd7f21a62bf8e280aa35af88f8c62c20N.exe" >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD5fece5887340dbe56224d8bb70045efb8
SHA1a7ea19e8b4189f5a6610cee8234764e79ebf01c3
SHA256f62c567ac642071be30bd95c3e8047749203058e31e6e3097ddb73ac521d2fd8
SHA512fa76effd1009ec855f1d9de894410b4aee2b87312459ae3003cd6dc5f3d4fe02f4ba827987ce2f1eeff9977b323e2f21c91001d13a1ec21f980bef0ad306f8a0