Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 04:43
Behavioral task
behavioral1
Sample
de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exe
Resource
win10v2004-20240709-en
General
-
Target
de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exe
-
Size
29KB
-
MD5
7b50d5b61459948747a512c407745e9b
-
SHA1
0d18c38242437dc4141e667c8004bdcd3ba01591
-
SHA256
de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3
-
SHA512
d7588adcd81cfcde32556bb9714bdd8737232cf3a174fa99b2e3003211a6f5648ba365d5497fef3c5e50181cd4428d2d00155306b7c097a98282d88ea4a4b904
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/b:AEwVs+0jNDY1qi/qz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
services.exepid process 668 services.exe -
Processes:
resource yara_rule behavioral2/memory/3228-0-0x0000000000500000-0x0000000000510200-memory.dmp upx C:\Windows\services.exe upx behavioral2/memory/668-6-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/668-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3228-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/668-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/668-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/668-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/668-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/668-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3228-37-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/668-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3228-42-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/668-43-0x0000000000400000-0x0000000000408000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\tmpF692.tmp upx behavioral2/memory/3228-197-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/668-239-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3228-297-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/668-298-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/668-302-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3228-306-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/668-307-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3228-417-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/668-418-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3228-598-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/668-599-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exeservices.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
Processes:
de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exedescription ioc process File opened for modification C:\Windows\java.exe de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exe File created C:\Windows\java.exe de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exe File created C:\Windows\services.exe de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exeservices.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exedescription pid process target process PID 3228 wrote to memory of 668 3228 de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exe services.exe PID 3228 wrote to memory of 668 3228 de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exe services.exe PID 3228 wrote to memory of 668 3228 de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exe services.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exe"C:\Users\Admin\AppData\Local\Temp\de30c5d03259b8b499344fc24b21ea4ef6dbba7a9000820d448e4074ad7e88e3.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ee4aed56584bf64c08683064e422b722
SHA145e5ba33f57c6848e84b66e7e856a6b60af6c4a8
SHA256a4e6ba8c1fe3df423e6f17fcbeeaa7e90e2bd2fffe8f98ff4b3e6ed970e32c61
SHA512058f023cb934a00c8f1c689001438c9bdd067d923ddcbe7a951f54d3ca82218803e0e81fbc9af5c56375ff7961deed0359af1ffa7335d41379ee97d01a76ded6
-
Filesize
159KB
MD5242e046603453172bd860cf32a6d03c5
SHA1a0bf4e94cce7fc6a31a7fc4fbf91a585b12aaf68
SHA2566f43e2fcfaa0a721844b16e9eff886654833a4e89ae0099f39b9469705f894de
SHA512f5cbb640d57970779abec79ebe5b921ba7d530b2636f368351bb4b09035a318bf5f75192e62caee8586dfd68dacc6aa6527b3cac2d469d85081e70eedfa491c0
-
Filesize
115KB
MD5852e36f44de5ec7f558fd8e4364e8076
SHA1270106ab156de15adbf873c85a0d16b26e3c239b
SHA25660780596a403ca3fce2dd6d1162cc27381af8ec69f5acc093b3b8d07a22224de
SHA51279b56c5a5e47b2900412ff2271427d833a2f8bb6fc2e6802fa77e4878b540910a3b3cfd63607113c78b4013a5fa17be4db31afaa0234eaac0acd6c6b3ff99d7d
-
Filesize
177KB
MD52aab8a74765d66e6105113d9401054f6
SHA18c1561fc157086b34377eae1ea5eb66a40966fef
SHA2569d10e2aed88e7fc1f61f6055f7669414fed4ae7cd98931935039fb82f667b414
SHA51253493d351470d522d45ebeb889328657859d24003617660f6e7ddb154aa1ee1ded8ab81e564ef712b17fd7cb83fd5be69a71b3a0db399327588d4f3c95a1aaea
-
Filesize
189KB
MD5990c7bdc174d3e3098fab9e4827f9ec8
SHA1304d3c187ee116248e0ab5533e9823cbd1e2c64f
SHA256dcf922fd8e0cdc3752729cabd37e972942a9e5eaa0230f036cf4cf2a485ac807
SHA512240e7cb09da326e652a5c1ecd917cc9227f626d93f3438687c9b4be2550b76c715d5de350ed6786e1568370741282aa24562043b373b9b08c5ffb10283211677
-
Filesize
175KB
MD541fe8f162fc87ad24b942a5c4d3578c7
SHA15911d832183ef1315884d29ff77ba3e09165cb85
SHA2560258076196cda3ee9f3c1c7e103eca494a8413d97c0d00b5c2fa94d388e8df9d
SHA512ccc905cfc4312d5445cc6f110bf5a71a218efd39e87b0f9b55b6a42cb320c39211323d550d6cf313782b0af437d931fae7b233210fbae0b48903732510eac912
-
Filesize
310B
MD52a8026547dafd0504845f41881ed3ab4
SHA1bedb776ce5eb9d61e602562a926d0fe182d499db
SHA256231fe7c979332b82ceccc3b3c0c2446bc2c3cab5c46fb7687c4bb579a8bba7ce
SHA5121f6fa43fc0cf5cbdb22649a156f36914b2479a93d220bf0e23a32c086da46dd37e8f3a789e7a405abef0782e7b3151087d253c63c6cefcad10fd47c699fbcf97
-
Filesize
117KB
MD5fbaf31d8457a3f9a8826551e2c3a08e0
SHA1b99645fe69818ebfc5c0436c19c028d40d9ac94d
SHA256882d14407d520378e437c8668f7ca2e114ef861138575923afdc99cd7ac163e8
SHA512d1b5141fed1afc8856dbeda10cb39cdf365afccfe402c75998b84679b5f9c106ae85593733f85e535bbc409643d1e79ed63fe99686306d18770eece4e506c47e
-
Filesize
106KB
MD5b8f6778837e1054207c42f84198bee3e
SHA109d2d6305420522b4b0a66279936e28d303ace9c
SHA256115d34cb33bf15b0788982c43f3d712848ffb65c31f6307d6eeff731739b2009
SHA512a01f294c52c598b2b5180ec71d8d9b600d78eafaf0bbf0179da92c62c50362845ede3896fe2cede902622b8d3f2e1e677881ed361b82212d8aee3d8b7cf6c48a
-
Filesize
130KB
MD5071073685ac2cf63eaf9c362686d1355
SHA1e307ec6152e247d5751a1dc23c474724becd69a4
SHA25628994c7b231820a15b041b86ee1c6a27462af6ac681c8046db40435f90c93cda
SHA5121d3642f86882bbbfb6f2db866125b51bcf5e2dac8e5bba764cb466bc68b1392b9ecee263a58a13a5683221dc35bed8b96bd55500c446a37258888dac1552fb07
-
Filesize
152KB
MD561ca703e90392bcc7b26b05b6966e47a
SHA183d059579300cfd46eee5d66f79ab1f0f0bd64a6
SHA256ea4cf23400fe29b0014c25dbafb139fd9fa10b80d66b65e05521b4e87c8daad7
SHA512c5f49204570a64d799b8e298ac7f7d179b889bee43a0789fbaae5e48ce51ed0a11895be38ea6a83acc80e3de12e86ecef7c82bf4acd11c7c3c41ce9c60e91d7b
-
Filesize
175KB
MD5808b713a95eb1667be008167a6cc0447
SHA1c5746f35696de9ef10c99a6a295379e182872980
SHA256c275a701c8c95ff8723cb58ce808bb8c402276ed218c3a972dc826176dbba65a
SHA51288049cdd623d3c06ca8e48f4daea91711defb5acc5f127c287ed8c7ec8c63919f6fb09714cfa150ad561ed8f2b46576b631464e51d8bcfe6e5af49e1da4506d2
-
Filesize
312B
MD5c15952329e9cd008b41f979b6c76b9a2
SHA153c58cc742b5a0273df8d01ba2779a979c1ff967
SHA2565d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA5126aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296
-
Filesize
1KB
MD5211da0345fa466aa8dbde830c83c19f8
SHA1779ece4d54a099274b2814a9780000ba49af1b81
SHA256aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5
SHA51237fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca
-
Filesize
132KB
MD5d93f2d1aae03629ffa71141f742c71d6
SHA137fffaa56673c7c6044789ba1910f8285e6e123e
SHA2566ee8b8b98570c4df8cc4609973c3d4d6e329fe9deeab5899eeda1c6281a1b4c5
SHA512e46d76e814ba471c3f52ca13747c28dd2e7d5e3284ab7feb4883d0096d723c8b68a3faf412c161eb68fe2820c29ba8e7627401e8ad6518980cf80ff8bb234ce0
-
Filesize
166KB
MD5c907841174c691c5cd0316063cd365d6
SHA18c730c0864ee796aebaa20d5a07767ad35c62669
SHA2566f70bcd603e38db60b8c3d59f7f7370c84c67c788864e8c15514c6ba61db9d73
SHA51204d42eb090d995af8b1e7ad4b21265aa31d7a51a206868e107983d5478cb3bc9a9f48094ce50f53ff154e11b2912ab48c9ec230b3bbd6592706aaeb086bdcdbd
-
Filesize
188KB
MD582de5079caa4aabb9420047cca7d225d
SHA19a027ebc31e2e4d361cc1d0d028b35715e4e9b26
SHA2565e00b43938bb47f62857230d39426dd3ac2fceeb47e710c724854f78cbc2f597
SHA512b5cb6db5f44f7c4f1256ea748e60ddcc47aceff9804319fc623313e63eafeb2382fa4eb76e55f7e4886f090487e34e43f5c027b690b532186e296f6c4d572686
-
Filesize
1KB
MD535a826c9d92a048812533924ecc2d036
SHA1cc2d0c7849ea5f36532958d31a823e95de787d93
SHA2560731a24ba3c569a734d2e8a74f9786c4b09c42af70457b185c56f147792168ea
SHA512fd385904a466768357de812d0474e34a0b5f089f1de1e46bd032d889b28f10db84c869f5e81a0e2f1c8ffdd8a110e0736a7d63c887d76de6f0a5fd30bb8ebecd
-
Filesize
134KB
MD5fd535ed1ecea9f2aa53970e1c2713ae4
SHA1065b64f4d377e6bcf34027da161ba2db4e77d981
SHA25649fba781d80be3f5f779182e93785478449bdfbfa01f2ed77e822fe2f424f6aa
SHA512ba6418dd12e0d7680627bf7f19f5099d7dfb9fed1b2f68eb9e8918bf46d6c9f523d5fd5ff76fd199d70c50a84986e6de42ac4e77f4d337ab1bb45721fc99716d
-
Filesize
134KB
MD54a191b1af25a5b1fa6f5e96c83b0762c
SHA1f9d6c0e7b8504394ca7c655bda8cf92cccc0e1dc
SHA256479aeff178346ee13462d55f0c703cd24331b7c819be39f4c5b1725a2feea4fa
SHA512a05e201f536dd1958d3954929ea7c178fec79df4cf66e5f47dd89622ed0485a8f0145aadb6607326281233ee0979d3bb0141f097d602f31b86374ee682b3a3b1
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
169KB
MD5291924e86fa4b64f315a7e10bb5dbe4c
SHA1958ca51a9779b25c79f78d1db486f19cf2409ea5
SHA2564db53a73e7cb92a2d9cc1c92bab60f50427a9d1d63d982f75883bb76a477ef7f
SHA512f67c90eeddf7d82de377e40474fb79aa64ca91953218edcb24f2d3666ee70475d2ed8adba3ec7848ab2a52bbed1c12bd9f2d21c80d2a3a6bc456de9878a3416d
-
Filesize
29KB
MD5c2971094f9c4844970eb708dfe8881bf
SHA1fb709ef436b0cfb0170077433bcbad2b810e67c8
SHA256c1f7817a9d87c13e2efc990aab63f1bd46069d7d146fd11bfe4f66a2241c51d6
SHA512636f3aac0aaccba60ee3545dcdeb5dbe95aa710150a6b10b1a10aade2cb34ffd6dc6a7e571cdc61f058a2cf9ddb9ee9145fab6191329937f8e38fd1a19ecb887
-
Filesize
352B
MD5ed3f7f1568729cd3977c365f96b00e3a
SHA1532d9e6a66e6860fa551f2228bd3223ce9b207bd
SHA256039a31923a33c300b58420cefd21ceb95da1d5786730222990a2bad5acb75fc5
SHA5121aece3b070864a4a6bc04fb75692278d5c022581ddc7b46a931ee6ae5d0413343e9c2cc299f6131bd1f764d77f38cc86a455fb7b2621f97864b930525b354045
-
Filesize
352B
MD5303b395d051550855f5eda5834747948
SHA1bbff7dd2b934b9270ee0c82f14ff59797003839b
SHA25679fd01daccab64e1014ac90dbfcd245f1987da830b6daa0953479bc0d57f30fa
SHA512bf8098170e667a6bf8f8fbab4c0c1e50593455d354088d51cd4055d6f005049cb8c782bf321d90df3c9816cc5ea0fac73b8d11c93faa78fe8f29675512585ef6
-
Filesize
352B
MD5595cba83bb962e7ed5fadac8dc0be561
SHA1fd4a680f03d1790e008b7070c35886fe7b4e9c98
SHA256bea6d3308761efbb3a46eb8b6dbd790d06c040f10832919dca1de6f2c0cd062d
SHA512891a8d51cf6dc599b9b61222c5bf70cea8fb67616095bcad019e15cef4d9e05d337d1080fa66bedd4740f19ddc1072575a438c423edebebf70fcefddea54fedb
-
Filesize
352B
MD5545494d7733ff1904fe237d4db36a00b
SHA16250e5c9de5ba376f797073d543d31a7d8ee78bc
SHA256c2ff0cdbb9598e2522a421abeb93ca5547dfd0d925605b61f8c647783eb0e9d9
SHA51229ed7a700400de5230344d4c6f56fd50b7f81b007f21d8e6f7fbad001405efc0a348e832269e1f9627f257cd972bf61311d0f7ee823afde19ef7f86921f40d1e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2