Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 05:26
Behavioral task
behavioral1
Sample
9884c0c2dbb4265bf993ac919e2d8930N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9884c0c2dbb4265bf993ac919e2d8930N.exe
Resource
win10v2004-20240709-en
General
-
Target
9884c0c2dbb4265bf993ac919e2d8930N.exe
-
Size
29KB
-
MD5
9884c0c2dbb4265bf993ac919e2d8930
-
SHA1
d7ea20ea99618e1426d5a2fe86d6f6786143f6db
-
SHA256
292d3e488675159c180ddb8a056fb47afb6c3ee24d2e6da60da6b2972ba3f11e
-
SHA512
162db0cfb6e20d2a18213f5a1f6f78b2a52595b0925f44b039b6e40346749e063e5323c21d505f9aa1bec92b797c03ac99f51e55256f8d01913857d7c954a830
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/9a:AEwVs+0jNDY1qi/q1a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
services.exepid process 2640 services.exe -
Processes:
resource yara_rule behavioral1/memory/2624-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2624-4-0x0000000000400000-0x0000000000408000-memory.dmp upx C:\Windows\services.exe upx behavioral1/memory/2640-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2624-17-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2640-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2640-23-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2640-29-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2640-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2624-35-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2640-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2624-40-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2640-41-0x0000000000400000-0x0000000000408000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\tmp2A3E.tmp upx behavioral1/memory/2624-59-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2640-60-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2624-63-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2640-64-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2624-68-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2640-69-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2624-70-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2640-71-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2624-75-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2640-76-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
9884c0c2dbb4265bf993ac919e2d8930N.exeservices.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 9884c0c2dbb4265bf993ac919e2d8930N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
Processes:
9884c0c2dbb4265bf993ac919e2d8930N.exedescription ioc process File created C:\Windows\java.exe 9884c0c2dbb4265bf993ac919e2d8930N.exe File created C:\Windows\services.exe 9884c0c2dbb4265bf993ac919e2d8930N.exe File opened for modification C:\Windows\java.exe 9884c0c2dbb4265bf993ac919e2d8930N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9884c0c2dbb4265bf993ac919e2d8930N.exeservices.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9884c0c2dbb4265bf993ac919e2d8930N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
9884c0c2dbb4265bf993ac919e2d8930N.exedescription pid process target process PID 2624 wrote to memory of 2640 2624 9884c0c2dbb4265bf993ac919e2d8930N.exe services.exe PID 2624 wrote to memory of 2640 2624 9884c0c2dbb4265bf993ac919e2d8930N.exe services.exe PID 2624 wrote to memory of 2640 2624 9884c0c2dbb4265bf993ac919e2d8930N.exe services.exe PID 2624 wrote to memory of 2640 2624 9884c0c2dbb4265bf993ac919e2d8930N.exe services.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9884c0c2dbb4265bf993ac919e2d8930N.exe"C:\Users\Admin\AppData\Local\Temp\9884c0c2dbb4265bf993ac919e2d8930N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5c3600e4382e3bb4f706c9935ee7b8583
SHA1fdf135068b376901824f7c56cea5dc0c89126c1e
SHA2561253c7dab31009d5a50e2e350fca2d85c43bfc565ee1cd4cd4d2f103c88a05b7
SHA512b56486579d065440dd2795c8a8a84da0678dd1465e2ba10c2669fbe71678c7ef407c062bedbba9a06fbc773ed7657a1cb0e9f0ac38ae347b18b6c29ab7e893f1
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
352B
MD59dc3644f543e5ee45422e997cdf7064a
SHA106d6310556ccb911b17a2ab5459169bbfa97cacf
SHA25683d0d32fc44a61ec97071bae2136fbec6e3566e3245c30ab2e31049ac789c03d
SHA512eb0c1ed8b7d59dafaf33b21ab33b1acfb0faae0f53bf841f8b4353008136aad2a0d3f4544e9d271463604409124f819aa08c2cbdb5b58be9b2fc0be97ce73c07
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2