Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
752a5fb3a64ec8ddfaede6dffac15070N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
752a5fb3a64ec8ddfaede6dffac15070N.exe
Resource
win10v2004-20240730-en
General
-
Target
752a5fb3a64ec8ddfaede6dffac15070N.exe
-
Size
987KB
-
MD5
752a5fb3a64ec8ddfaede6dffac15070
-
SHA1
dcef912fdb710765b1be3d973c747b6dc5710d86
-
SHA256
c0043b682d57960006a635e2f31ac075afda681511a6d420cd831278c7a71763
-
SHA512
4b9171d5ef0d4f6efa1d3af004a57089e852484ef634ccd23ea6dd370119dbc5c89448d708aa3bb8e1a333ba4ab936b5478536e1d479e6e8cab26b1287002bcb
-
SSDEEP
12288:/1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0FoWxJpcEi0/3IWV//7cSd6Apt3Kt91EK:/1/aGLDCM4D8ayGMZo8/pjY4oYM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2788 qvjnvn.exe -
Loads dropped DLL 2 IoCs
pid Process 2636 752a5fb3a64ec8ddfaede6dffac15070N.exe 2636 752a5fb3a64ec8ddfaede6dffac15070N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\qvjnvn.exe" qvjnvn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 752a5fb3a64ec8ddfaede6dffac15070N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qvjnvn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2788 2636 752a5fb3a64ec8ddfaede6dffac15070N.exe 30 PID 2636 wrote to memory of 2788 2636 752a5fb3a64ec8ddfaede6dffac15070N.exe 30 PID 2636 wrote to memory of 2788 2636 752a5fb3a64ec8ddfaede6dffac15070N.exe 30 PID 2636 wrote to memory of 2788 2636 752a5fb3a64ec8ddfaede6dffac15070N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\752a5fb3a64ec8ddfaede6dffac15070N.exe"C:\Users\Admin\AppData\Local\Temp\752a5fb3a64ec8ddfaede6dffac15070N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\ProgramData\qvjnvn.exe"C:\ProgramData\qvjnvn.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
987KB
MD5e67c9e00a63bcb43b6b8e5b1cf0e86f8
SHA168c133802cb50beca077d23341afc2a5053c8548
SHA25630b17f4bb1868b3f5e585cb3c72f9635a5a3d89715b926a8f5a0ca78f738d133
SHA512e2fda1b68d2268d2da3fdbe6169c9c1dcde180542a66596aa7ea1e3604c5962be0152a25822f0a371955e5e1dfc95b3d11986afc88d88850dbcba0f21ae483ae
-
Filesize
477KB
MD52549139ceeb2c40c2ea0aeb04527d833
SHA1fc3ba9c0207120d626d83d9a3281f82c9c617e96
SHA256109a11e4721582eec651e224d8191e0878ebf3adc29c8399eba0217394924041
SHA512fd917d1c67f5eb92cc6a8d1be59e4decb1e0d3bba05074c65a8006650f77655645eb78a7a50f750a7df2ec27e035c0723413140c1c06be8691e770fa0f13c0e5
-
Filesize
509KB
MD5050d326500aa8eebd310dba30959e7cd
SHA17b838e54690efb2ff485968f37028d6c0b077371
SHA256ea0cb7ff41fac36cd3c2e24b1e23d29e774c0fc868dcf445149011963e68c05d
SHA5125fa372cdb802d52c5794113453b7bc88a658c0a6a9bd240780cfea952856edcd4dfced56080bb8d94f943443a629f7094f58379fc7e629a242c97c22b4336738