Analysis
-
max time kernel
428s -
max time network
438s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:10
Static task
static1
Behavioral task
behavioral1
Sample
closetcheater.exe
Resource
win10v2004-20240730-en
General
-
Target
closetcheater.exe
-
Size
94KB
-
MD5
576087a50a2429dd9f7c1d11ef9cf803
-
SHA1
ca2aabcb8ad63cde3b290beb1223bf4dc32b2d4c
-
SHA256
40a9e98c09729e502abcc3c5af53a39b7e740cf6ce2c2604c7fee7ca334be021
-
SHA512
75aa7052baa915aeda5a74dc67ae1653d8f51be63628231051efe9771b05138e9632dc4221aa47193aca94865a4774da86eae41653f958e146a05f404f7be295
-
SSDEEP
1536:o2Y0VNblnigen1FQGpaika1PASjg/oNRBQFSRmfm33qgH+:o23rbZi/8GprF3jg/ovBRh+
Malware Config
Signatures
-
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 2096 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language closetcheater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4704 wrote to memory of 3228 4704 closetcheater.exe 84 PID 4704 wrote to memory of 3228 4704 closetcheater.exe 84 PID 4704 wrote to memory of 3228 4704 closetcheater.exe 84 PID 3228 wrote to memory of 1464 3228 cmd.exe 85 PID 3228 wrote to memory of 1464 3228 cmd.exe 85 PID 3228 wrote to memory of 1464 3228 cmd.exe 85 PID 4704 wrote to memory of 3068 4704 closetcheater.exe 86 PID 4704 wrote to memory of 3068 4704 closetcheater.exe 86 PID 4704 wrote to memory of 3068 4704 closetcheater.exe 86 PID 4704 wrote to memory of 2772 4704 closetcheater.exe 87 PID 4704 wrote to memory of 2772 4704 closetcheater.exe 87 PID 4704 wrote to memory of 2772 4704 closetcheater.exe 87 PID 4704 wrote to memory of 60 4704 closetcheater.exe 89 PID 4704 wrote to memory of 60 4704 closetcheater.exe 89 PID 4704 wrote to memory of 60 4704 closetcheater.exe 89 PID 4704 wrote to memory of 2096 4704 closetcheater.exe 90 PID 4704 wrote to memory of 2096 4704 closetcheater.exe 90 PID 4704 wrote to memory of 2096 4704 closetcheater.exe 90 PID 2096 wrote to memory of 596 2096 cmd.exe 91 PID 2096 wrote to memory of 596 2096 cmd.exe 91 PID 2096 wrote to memory of 596 2096 cmd.exe 91 PID 4704 wrote to memory of 1320 4704 closetcheater.exe 92 PID 4704 wrote to memory of 1320 4704 closetcheater.exe 92 PID 4704 wrote to memory of 1320 4704 closetcheater.exe 92 PID 4704 wrote to memory of 1880 4704 closetcheater.exe 93 PID 4704 wrote to memory of 1880 4704 closetcheater.exe 93 PID 4704 wrote to memory of 1880 4704 closetcheater.exe 93 PID 4704 wrote to memory of 2508 4704 closetcheater.exe 95 PID 4704 wrote to memory of 2508 4704 closetcheater.exe 95 PID 4704 wrote to memory of 2508 4704 closetcheater.exe 95 PID 4704 wrote to memory of 2724 4704 closetcheater.exe 96 PID 4704 wrote to memory of 2724 4704 closetcheater.exe 96 PID 4704 wrote to memory of 2724 4704 closetcheater.exe 96 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 596 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\closetcheater.exe"C:\Users\Admin\AppData\Local\Temp\closetcheater.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c mode con:cols=0120 lines=00302⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\mode.commode con:cols=0120 lines=00303⤵
- System Location Discovery: System Language Discovery
PID:1464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c title Window Title2⤵
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\myfiles" mkdir "C:\Users\Admin\AppData\Local\Temp\myfiles"2⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\wtmpd" mkdir "C:\Users\Admin\AppData\Local\Temp\wtmpd"2⤵
- System Location Discovery: System Language Discovery
PID:60
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo:0>C:\Users\Admin\AppData\Local\Temp\i6.t2⤵
- System Location Discovery: System Language Discovery
PID:1320
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\i6.bat2⤵
- System Location Discovery: System Language Discovery
PID:1880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵
- System Location Discovery: System Language Discovery
PID:2508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵
- System Location Discovery: System Language Discovery
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173B
MD50f8f70e88009593eefaa155a8e31b1d6
SHA1eabcc3f2135e0919e9456da0a4b1084f3382d4b6
SHA256941c169c07670650fc6c6148c1cae068b69bac209e05010594e164aafc7cdf8b
SHA51294df468b963f3c9d133a25e1ffa57039fac01fe960f0f738552ca6440e6242ff48d0b410fe70dd05a62e4842c925c9f2b0220ca9eb9cb4ff5490ada443c9a750