Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 18:01
Static task
static1
Behavioral task
behavioral1
Sample
3bfe0bf60a3cf48cd4c914030796deb0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3bfe0bf60a3cf48cd4c914030796deb0N.exe
Resource
win10v2004-20240709-en
General
-
Target
3bfe0bf60a3cf48cd4c914030796deb0N.exe
-
Size
20KB
-
MD5
3bfe0bf60a3cf48cd4c914030796deb0
-
SHA1
ff7bb48583e86d4af5935339486d37f7d42c2407
-
SHA256
ac9a75da9c85e6fad0ee7252e9ab11dcb714822456ed07d12f159f97a6002deb
-
SHA512
48ee4b00dcef3cbb7e89ed276fd7034cbd47de98567bbe037aa2cc1bbebc95e5f254a36365155ba4e1b8f03bd0f40d4a7c983b9196b98544c0f87636ba88ac33
-
SSDEEP
384:OI/t6vqxuhenoPYpr/LjggggggLvggggggggUaoclh:O2tmhSsYvggggggLvggggggggUaocr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2636 vokfg.exe -
Loads dropped DLL 1 IoCs
pid Process 2964 3bfe0bf60a3cf48cd4c914030796deb0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bfe0bf60a3cf48cd4c914030796deb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vokfg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2636 2964 3bfe0bf60a3cf48cd4c914030796deb0N.exe 30 PID 2964 wrote to memory of 2636 2964 3bfe0bf60a3cf48cd4c914030796deb0N.exe 30 PID 2964 wrote to memory of 2636 2964 3bfe0bf60a3cf48cd4c914030796deb0N.exe 30 PID 2964 wrote to memory of 2636 2964 3bfe0bf60a3cf48cd4c914030796deb0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bfe0bf60a3cf48cd4c914030796deb0N.exe"C:\Users\Admin\AppData\Local\Temp\3bfe0bf60a3cf48cd4c914030796deb0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\vokfg.exe"C:\Users\Admin\AppData\Local\Temp\vokfg.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD512e8da9212a63d5ee3c58137e2bfc979
SHA185cc64e57eff7047131550d21c0cbcf32d1cecd1
SHA256c85f978089cc3ed66b5f8265f268b32ff29326201716878fe19201485a94df50
SHA512de4c7bd70a26dba3790b4f1e43b813b48af4e77562c2379ab6065f1cd3fa0853da1c6c24510a60f98b965251e84b6a5d83344ca087f111f8ea00b97dba7dbd50