Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:31
Static task
static1
Behavioral task
behavioral1
Sample
05d25579a65b40db44e4a29a5d4c5f80N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
05d25579a65b40db44e4a29a5d4c5f80N.exe
Resource
win10v2004-20240730-en
General
-
Target
05d25579a65b40db44e4a29a5d4c5f80N.exe
-
Size
932KB
-
MD5
05d25579a65b40db44e4a29a5d4c5f80
-
SHA1
55459850f8ebdadc86d7694db9d99ca55c60e210
-
SHA256
696ac8856cfd21ee8d292a1540be046dc6a9c47864c68ef95a0a9b237fc358a9
-
SHA512
6fee6f636ed6b90b40ab48858c4d34d9a6067ee208c6d4510f6000bf8ea229a9614a52563941a64914be0c1f52ed7b2c515db7f328f258618c0169dfad40eb36
-
SSDEEP
24576:71/aGLDCM4D8ayGMZo8/dXpPUA9aD1qGel:0D8ayGMZoKx19rGel
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4352 pnrtti.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-195445723-368091294-1661186673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\pnrtti.exe" pnrtti.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05d25579a65b40db44e4a29a5d4c5f80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnrtti.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4716 wrote to memory of 4352 4716 05d25579a65b40db44e4a29a5d4c5f80N.exe 85 PID 4716 wrote to memory of 4352 4716 05d25579a65b40db44e4a29a5d4c5f80N.exe 85 PID 4716 wrote to memory of 4352 4716 05d25579a65b40db44e4a29a5d4c5f80N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\05d25579a65b40db44e4a29a5d4c5f80N.exe"C:\Users\Admin\AppData\Local\Temp\05d25579a65b40db44e4a29a5d4c5f80N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\ProgramData\pnrtti.exe"C:\ProgramData\pnrtti.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD5768e2690b62d5ccaa83be9220d75a7fd
SHA15de82ae93b55719d5774c558f3d04dde24084468
SHA25685d3e6803ceeae2fb24391bea93ccc88e860b28018e9df29a07269df316d64ad
SHA51243be3c89a014843ceb4d03869afce309804b75ac6ed153b9de5037e1303e3a2e0a20c9f467ccb8e0ec9bf678f44fdbdb216a8370bb6ec0cffcd090196bd0b958
-
Filesize
477KB
MD571e38cb8371fa644436922e0eee6040d
SHA16e9e897cb95fd8434891e87a584f5f1b9482cae2
SHA2562c97f31658ca63791439d384a5c4488bdca89adac6c363c2cc97e5763af30db4
SHA512852954de6ce9732c6533d475ebd22f308c5659690d5197dd5865cde0ef740b40f380035baf8d9e6e38dc0541b5f16ffb01ea1560cbb89528ec4b2214c7fcc3be
-
Filesize
454KB
MD5c3309b70fa11e5277b9e912ffd032d18
SHA130e3ef7543a02c2169a7baec326f6c2a405f1dd2
SHA2563e13f5ec8d65be681a1c7fe9be01a590481953ca427ad3c2833b405da78962ff
SHA512e8cb700d371c7e04bc9c5161f7e5bf5e4512f6fa4b3fccf7f6ff887f0894afc6dc0eff310f3b78314f4bec8a3203cb6075e665225a59b2b66191ad7ce5db1885