Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 05:39
Behavioral task
behavioral1
Sample
9a86caee93e528afc54a7f25d80a2460N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9a86caee93e528afc54a7f25d80a2460N.exe
Resource
win10v2004-20240709-en
General
-
Target
9a86caee93e528afc54a7f25d80a2460N.exe
-
Size
29KB
-
MD5
9a86caee93e528afc54a7f25d80a2460
-
SHA1
dd416f149509fb5dadf2a717c72fd895a2ae8aa7
-
SHA256
e0bd8c194a239ea78c6ba0900ba7427b7aa5582a59299c9084e1d2559f274bad
-
SHA512
545c9cf299a56f043dbe852f587381260fcf4a37415a813af9aa4385092a94bdf23485c0b9eb7c64a41e59f5618a5e5c15a4b9f6da6bfe3d9dfa504c6b62d622
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/Nts0:AEwVs+0jNDY1qi/qHs0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3108 services.exe -
resource yara_rule behavioral2/memory/4304-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x0008000000023479-4.dat upx behavioral2/memory/3108-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4304-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3108-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-27-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-34-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-39-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-44-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-49-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3108-51-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4304-55-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3108-56-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 9a86caee93e528afc54a7f25d80a2460N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 9a86caee93e528afc54a7f25d80a2460N.exe File opened for modification C:\Windows\java.exe 9a86caee93e528afc54a7f25d80a2460N.exe File created C:\Windows\java.exe 9a86caee93e528afc54a7f25d80a2460N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a86caee93e528afc54a7f25d80a2460N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4304 wrote to memory of 3108 4304 9a86caee93e528afc54a7f25d80a2460N.exe 87 PID 4304 wrote to memory of 3108 4304 9a86caee93e528afc54a7f25d80a2460N.exe 87 PID 4304 wrote to memory of 3108 4304 9a86caee93e528afc54a7f25d80a2460N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a86caee93e528afc54a7f25d80a2460N.exe"C:\Users\Admin\AppData\Local\Temp\9a86caee93e528afc54a7f25d80a2460N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2