Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 05:39
Behavioral task
behavioral1
Sample
9a86caee93e528afc54a7f25d80a2460N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9a86caee93e528afc54a7f25d80a2460N.exe
Resource
win10v2004-20240709-en
General
-
Target
9a86caee93e528afc54a7f25d80a2460N.exe
-
Size
29KB
-
MD5
9a86caee93e528afc54a7f25d80a2460
-
SHA1
dd416f149509fb5dadf2a717c72fd895a2ae8aa7
-
SHA256
e0bd8c194a239ea78c6ba0900ba7427b7aa5582a59299c9084e1d2559f274bad
-
SHA512
545c9cf299a56f043dbe852f587381260fcf4a37415a813af9aa4385092a94bdf23485c0b9eb7c64a41e59f5618a5e5c15a4b9f6da6bfe3d9dfa504c6b62d622
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/Nts0:AEwVs+0jNDY1qi/qHs0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2764 services.exe -
resource yara_rule behavioral1/memory/1940-2-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1940-4-0x0000000000220000-0x0000000000228000-memory.dmp upx behavioral1/files/0x0009000000016d21-7.dat upx behavioral1/memory/1940-15-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2764-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2764-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2764-27-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2764-29-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2764-34-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2764-39-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2764-41-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2764-46-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2764-51-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1940-52-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2764-53-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1940-57-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2764-58-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0005000000004ed7-68.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 9a86caee93e528afc54a7f25d80a2460N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 9a86caee93e528afc54a7f25d80a2460N.exe File opened for modification C:\Windows\java.exe 9a86caee93e528afc54a7f25d80a2460N.exe File created C:\Windows\java.exe 9a86caee93e528afc54a7f25d80a2460N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a86caee93e528afc54a7f25d80a2460N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2764 1940 9a86caee93e528afc54a7f25d80a2460N.exe 30 PID 1940 wrote to memory of 2764 1940 9a86caee93e528afc54a7f25d80a2460N.exe 30 PID 1940 wrote to memory of 2764 1940 9a86caee93e528afc54a7f25d80a2460N.exe 30 PID 1940 wrote to memory of 2764 1940 9a86caee93e528afc54a7f25d80a2460N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a86caee93e528afc54a7f25d80a2460N.exe"C:\Users\Admin\AppData\Local\Temp\9a86caee93e528afc54a7f25d80a2460N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5ada36749efa59d1a9a42ebb6e8905c0e
SHA1a2c1edb8a5922a2aad25d5764e18cd462b9dc913
SHA2562c1f6cd34dbd5ba823fbd1250ac5dd7f3b750243db44036835db2caea1835734
SHA5126ea65ee80dd6db375cea17ef6f77519f8c5f9f51fd577682d23b72af2600056f87b978b590612bc889c90c439a19e19bddb89b032bf24dc141c6c1c07c641bb8
-
Filesize
352B
MD5780168555204f545a60e344e81f72ed8
SHA1ccffc38a7298375aef0a74e671e03a0ac60ee18d
SHA256470046b0ef106a7d0e9d6bd1421627539553ebd84b372f08bfeb33f48f90478f
SHA51273e36bb0061f060efbd6ebe1885331f3d65dac31e73a74c69e02201416f87289425abc06cd8817ff0dcb8a28f386e089c4d832151368fb413a20cfecafcff88b
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2