Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 16:36
Static task
static1
Behavioral task
behavioral1
Sample
2febce7a0b1d320916a6238192d02d70N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2febce7a0b1d320916a6238192d02d70N.exe
Resource
win10v2004-20240709-en
General
-
Target
2febce7a0b1d320916a6238192d02d70N.exe
-
Size
65KB
-
MD5
2febce7a0b1d320916a6238192d02d70
-
SHA1
b83779f08c09a47352d0eba7e89d30104defe62f
-
SHA256
5b7c083d816aca52559b34242a3b106d2781737f87b93504f153adf7777fedbe
-
SHA512
bf48498ccab502dee6ae65acd9cdafd33c251eecd51e99c56bc1675dd246bf8d6600901aa65ee8e1c1e0bad4b5b53dbd7678a7e2f3d5417f9168c8ebf1f481e1
-
SSDEEP
768:5P1eYkSYkw6ialLalFgziMqsySuj9pHqqV2y26zdISGe3Qb5L:/VS34W/gziMc/24zdISGuC5L
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2784 senis.exe -
Loads dropped DLL 2 IoCs
pid Process 2312 2febce7a0b1d320916a6238192d02d70N.exe 2312 2febce7a0b1d320916a6238192d02d70N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2febce7a0b1d320916a6238192d02d70N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2312 2febce7a0b1d320916a6238192d02d70N.exe 2784 senis.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2784 2312 2febce7a0b1d320916a6238192d02d70N.exe 30 PID 2312 wrote to memory of 2784 2312 2febce7a0b1d320916a6238192d02d70N.exe 30 PID 2312 wrote to memory of 2784 2312 2febce7a0b1d320916a6238192d02d70N.exe 30 PID 2312 wrote to memory of 2784 2312 2febce7a0b1d320916a6238192d02d70N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2febce7a0b1d320916a6238192d02d70N.exe"C:\Users\Admin\AppData\Local\Temp\2febce7a0b1d320916a6238192d02d70N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\senis.exe"C:\Users\Admin\AppData\Local\Temp\senis.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5a0ba48be2a2ed897e86d560e4b59541e
SHA1154a11ce79bc7396ed6b49b857d553121bce9573
SHA2567da4cb916198c001295c86fddbc8a811b250230c1e7e4729387d25e6b580a002
SHA512d72a974b68c7281c01a116fe778c1934246b4e47f9314c81b1018e58427849b7152c764cf308591cd05fad60ba06e1083632f76333586821e25e0ead1847ee9e