Analysis
-
max time kernel
119s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
11dd3e80a04eac239eb5383e9f67cfc0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
11dd3e80a04eac239eb5383e9f67cfc0N.exe
Resource
win10v2004-20240730-en
General
-
Target
11dd3e80a04eac239eb5383e9f67cfc0N.exe
-
Size
480KB
-
MD5
11dd3e80a04eac239eb5383e9f67cfc0
-
SHA1
62b6bbad54450eed06a6498201ec61b08e52d2ec
-
SHA256
6d81347f25dd30b91cf1eba3665033c2372990339d3e049aaa44d7dc84821fe6
-
SHA512
d3560004940bf7e414f590537672bcc357f2864255b0556110a181108780068dad5e9d17b4289b8f6c25700d8e109e4d532c97b02680183ff05f45d26d821dff
-
SSDEEP
12288:AjauDReW7hjTQu1YVl8BgSl3IPpBufd3XJh1:ADDhYtlDSl3IPk1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3536 tgnnou.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1266786182-1874524688-71015548-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\tgnnou.exe" tgnnou.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11dd3e80a04eac239eb5383e9f67cfc0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgnnou.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1548 wrote to memory of 3536 1548 11dd3e80a04eac239eb5383e9f67cfc0N.exe 85 PID 1548 wrote to memory of 3536 1548 11dd3e80a04eac239eb5383e9f67cfc0N.exe 85 PID 1548 wrote to memory of 3536 1548 11dd3e80a04eac239eb5383e9f67cfc0N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\11dd3e80a04eac239eb5383e9f67cfc0N.exe"C:\Users\Admin\AppData\Local\Temp\11dd3e80a04eac239eb5383e9f67cfc0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\ProgramData\tgnnou.exe"C:\ProgramData\tgnnou.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480KB
MD5efcf00e4efd58c03a052794fcd9d7f71
SHA1145d53fa3e9e6c497cd0953bbc4e406e4d4e11f9
SHA2569c2e985a0ac9f29b3d5c4589020e92ddd71ef7cbc8713691cb683324102f7dd1
SHA512363275109ff80f8b4e405c226dc94f22d45c08110828a30be0b3e8c6d16460ab7ec209ecd12f3e982d0e04e7a9b9d7af717fb0db5b5b1507f713b29138e99980
-
Filesize
136KB
MD52bd01b99551cc639ddb5cb66914904a6
SHA150beb8bab8be15271951130ac833eb19566f9333
SHA2569764e531dd52e37a454c7f052a17fe7b68821dc3570286aab7bb4706639efe40
SHA512374436459d62bdd62fc79b779e5aef155d7b8817e3d64e53639130be49d061a251d04a3882d403c1cacf890f91fa53e9137e551f3f6479341e09fe97c7bf2390
-
Filesize
343KB
MD563c384ade8c7e1c606b1207a0b9b4a07
SHA158b443d30fbe8241db2562b9abc6e0228268e20e
SHA256ba27c0392a9a869925ebaf76b5d2b08e567d5b74bf7cbf2639d8bb5e373f80c3
SHA5128139d84dd93a13ce8d48c85a394d743d1556f81549798cf251683a6942a258635b29234bfc35bd7b4c9c3227206a7877d9f0ce337bba39059ce8b24a18c778ee