Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
4635bcfb93c1ce591bb64a37b153b9c0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4635bcfb93c1ce591bb64a37b153b9c0N.exe
Resource
win10v2004-20240709-en
General
-
Target
4635bcfb93c1ce591bb64a37b153b9c0N.exe
-
Size
39KB
-
MD5
4635bcfb93c1ce591bb64a37b153b9c0
-
SHA1
38d70d09125a7446e82c6e7d4cfbe2e055dad01f
-
SHA256
190182ce6fcfd4f0ebb86aeb5ce36d8f30a1593663cf6d6cbdf4f7dc6c20f100
-
SHA512
ed30f78d41ea293da6bf35779651a42190037b8de3b42720179f59113cd4eb47efaf73af5c1966738e8b7e072bca46ff84ae43704f557fa74ec1be09190c6c96
-
SSDEEP
768:swg9aYfQkXdmCdMimsENm4QctLEF+BbvlBa:sR0QQwndcsE0vCvu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 484 hhcbrnaff.exe -
Loads dropped DLL 1 IoCs
pid Process 2452 4635bcfb93c1ce591bb64a37b153b9c0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4635bcfb93c1ce591bb64a37b153b9c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhcbrnaff.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2452 wrote to memory of 484 2452 4635bcfb93c1ce591bb64a37b153b9c0N.exe 30 PID 2452 wrote to memory of 484 2452 4635bcfb93c1ce591bb64a37b153b9c0N.exe 30 PID 2452 wrote to memory of 484 2452 4635bcfb93c1ce591bb64a37b153b9c0N.exe 30 PID 2452 wrote to memory of 484 2452 4635bcfb93c1ce591bb64a37b153b9c0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4635bcfb93c1ce591bb64a37b153b9c0N.exe"C:\Users\Admin\AppData\Local\Temp\4635bcfb93c1ce591bb64a37b153b9c0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD557268c50408ab3735bf5b14e8790a9a7
SHA183ce35d68ba243573433dc12b63559808c8288b9
SHA25667ed3e02fa9411ef6122a29871d4613e19c469a99d76f8f89e3218ca60c6813f
SHA512800ee8d68a76c00de8e508279baffdc8f275588d81e0bfdffd8dbaed5ccc1173bdbb4c8358c95a5b8edac9213a59b97b723ff6649b885a4115d6f640cd43ea2e