Overview
overview
10Static
static
71.exe
windows11-21h2-x64
7Fallen.exe
windows11-21h2-x64
7Inte.exe
windows11-21h2-x64
7LX64
windows11-21h2-x64
1Server.exe
windows11-21h2-x64
7hfs.exe
windows11-21h2-x64
10hfs_1.exe
windows11-21h2-x64
10hg
windows11-21h2-x64
1java
windows11-21h2-x64
1moren.exe
windows11-21h2-x64
10Resubmissions
02-08-2024 16:33
240802-t2wr5s1eqj 10Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-08-2024 16:33
Behavioral task
behavioral1
Sample
1.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Fallen.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Inte.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
LX64
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Server.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
hfs.exe
Resource
win11-20240730-en
Behavioral task
behavioral7
Sample
hfs_1.exe
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
hg
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
java
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
moren.exe
Resource
win11-20240802-en
General
-
Target
1.exe
-
Size
103KB
-
MD5
4a953a639593adb97eacef0e3992b818
-
SHA1
ecf5ae2648ec0660c82912c0fd6ecc7fbfab9df2
-
SHA256
f3ea4dfbb6a31ba417d3e9caa90159e0e786226743a7b5ed04701f847054366f
-
SHA512
ea701c6474dfa1d910c5c3abbfa01e615bab73521f841eb15b9d76488cff6e6aa33caff4c7c65bfc97f8ff47e06e17e9979cd0ff305fd18aed76729500822e3b
-
SSDEEP
3072:d1Gqq3S4eaIv3RcX00sQJS+a/u/uLx0By:d1Gqq3LeRChsQQ+a/x0By
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Sougou.exepid process 4760 Sougou.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1.exeSougou.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Ball = "C:\\progra~1\\Common Files\\Sogou.exe" 1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Ball = "C:\\progra~1\\Common Files\\Sogou.exe" Sougou.exe -
Drops file in System32 directory 1 IoCs
Processes:
Sogou.exedescription ioc process File created C:\Windows\SysWOW64\Sougou.exe Sogou.exe -
Drops file in Program Files directory 1 IoCs
Processes:
Sougou.exedescription ioc process File created C:\progra~1\Common Files\Sogou.exe Sougou.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exeSogou.exeSougou.exeSogou.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sogou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sougou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sogou.exe -
Suspicious behavior: RenamesItself 3 IoCs
Processes:
1.exeSogou.exeSogou.exepid process 4932 1.exe 3052 Sogou.exe 4088 Sogou.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
1.exeSougou.exedescription pid process target process PID 4932 wrote to memory of 3052 4932 1.exe Sogou.exe PID 4932 wrote to memory of 3052 4932 1.exe Sogou.exe PID 4932 wrote to memory of 3052 4932 1.exe Sogou.exe PID 4760 wrote to memory of 4088 4760 Sougou.exe Sogou.exe PID 4760 wrote to memory of 4088 4760 Sougou.exe Sogou.exe PID 4760 wrote to memory of 4088 4760 Sougou.exe Sogou.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\progra~1\Common Files\Sogou.exe"C:\progra~1\Common Files\Sogou.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
-
C:\Windows\SysWOW64\Sougou.exeC:\Windows\SysWOW64\Sougou.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
-
C:\progra~1\Common Files\Sogou.exe"C:\progra~1\Common Files\Sogou.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\Sougou.exeFilesize
27.1MB
MD5de052bcf8c5f1f9415f1dd02fbf5d7bd
SHA1100b35c23669a8dae96a144d9fb38d101d56f41d
SHA2567669cb7d7ac2c19cb83023393655098d3947cbe7cf4b85f77eb75e2847b984e0
SHA512f7f2b449d941e56ceb0dfade2b99913f95a94741bd6878ba35fba2e5a887857deaf6fb3cb56ad98ffbb0219fbcf28ec275040a917342ba14aa7bafde3bb676c5
-
memory/3052-3-0x0000000000400000-0x0000000000419EE0-memory.dmpFilesize
103KB
-
memory/4088-6-0x0000000000400000-0x0000000000419EE0-memory.dmpFilesize
103KB
-
memory/4760-5-0x0000000000400000-0x0000000000419EE0-memory.dmpFilesize
103KB
-
memory/4932-4-0x0000000000400000-0x0000000000419EE0-memory.dmpFilesize
103KB