Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
b6e1cbd182f1a207b2bc85590d2fd6a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b6e1cbd182f1a207b2bc85590d2fd6a0N.exe
Resource
win10v2004-20240709-en
General
-
Target
b6e1cbd182f1a207b2bc85590d2fd6a0N.exe
-
Size
540KB
-
MD5
b6e1cbd182f1a207b2bc85590d2fd6a0
-
SHA1
16b5bcef3293ec26d4009f45d448d857ad303205
-
SHA256
696d211f20099957356bb36ae0bdab9b0a6864ac3817c2446bb15bdbf21afcb2
-
SHA512
9a18b2b7c5b1554e8313b248b2d33ce4be22c1322bc65264ca27fcc35ad0c05b274903a8bd66988c6f4983917d3f4f84337761e47e0b117a1b58cd4abb0fcfef
-
SSDEEP
6144:jZQx+mI07CciO8DoOiECX0oAppVeh2ELimSlaJwDFO+sdN3+f2XkTl+XOzol+KXl:a95iO8D3CXQVI/LiaJAFO5DMWrXNcc
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2252 F151.tmp 2464 b6e1cbd182f1a207b2bc85590d2fd6a0N.exe -
Loads dropped DLL 3 IoCs
pid Process 2088 b6e1cbd182f1a207b2bc85590d2fd6a0N.exe 2252 F151.tmp 2252 F151.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F151.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6e1cbd182f1a207b2bc85590d2fd6a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6e1cbd182f1a207b2bc85590d2fd6a0N.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2252 F151.tmp -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2252 F151.tmp -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2252 2088 b6e1cbd182f1a207b2bc85590d2fd6a0N.exe 31 PID 2088 wrote to memory of 2252 2088 b6e1cbd182f1a207b2bc85590d2fd6a0N.exe 31 PID 2088 wrote to memory of 2252 2088 b6e1cbd182f1a207b2bc85590d2fd6a0N.exe 31 PID 2088 wrote to memory of 2252 2088 b6e1cbd182f1a207b2bc85590d2fd6a0N.exe 31 PID 2252 wrote to memory of 2464 2252 F151.tmp 32 PID 2252 wrote to memory of 2464 2252 F151.tmp 32 PID 2252 wrote to memory of 2464 2252 F151.tmp 32 PID 2252 wrote to memory of 2464 2252 F151.tmp 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6e1cbd182f1a207b2bc85590d2fd6a0N.exe"C:\Users\Admin\AppData\Local\Temp\b6e1cbd182f1a207b2bc85590d2fd6a0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\F151.tmp"C:\Users\Admin\AppData\Local\Temp\F151.tmp" --pingC:\Users\Admin\AppData\Local\Temp\b6e1cbd182f1a207b2bc85590d2fd6a0N.exe 9F48422ED941C40EE3C473BEEDBEA575B418FDBB814C956EA4E7795228910A5C6DE1A73FBEF29BCA3C15536DD568C0EB7D4F5DDCCB0D3E48131905704EA4E35D2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\b6e1cbd182f1a207b2bc85590d2fd6a0N.exe"C:\Users\Admin\AppData\Local\Temp\b6e1cbd182f1a207b2bc85590d2fd6a0N.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2464
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD57f241723d1b72328adbc57be2207b04c
SHA16ad025966686ec8fdc443ebf7664cf70ba4df622
SHA256fbc6181bec995e07734f928ddbc7d9dbdd32d6274a127a26e6b4ebbf186aa7ce
SHA51297cf151115d46e29591e2ba91a438d0de1ea6f8b349595da49dd546c8391315a51e3678e97efd6e8676bef5ae528feda016c3d0f3a71d2b83f51415345b69761
-
Filesize
180KB
MD51e4524dd4963fad9da23cc9dd22362be
SHA1b13c2d9d734aea7d0912e000b367f58aa332954f
SHA2567cb106de2392ae9c71eb7234747b0ae157c2487750cd5034a239247b8de02779
SHA5121e3c1db9e57fc9aa1af626f5de8ddd5131c100ce8fef459e2b7cc65765dfc22ddb644c10f23bd28384616fe45b37039d95ee34861c3d5e5bec3b5464cc3efac4