Overview
overview
10Static
static
71.exe
windows11-21h2-x64
7Fallen.exe
windows11-21h2-x64
7Inte.exe
windows11-21h2-x64
7LX64
windows11-21h2-x64
1Server.exe
windows11-21h2-x64
7hfs.exe
windows11-21h2-x64
10hfs_1.exe
windows11-21h2-x64
10hg
windows11-21h2-x64
1java
windows11-21h2-x64
1moren.exe
windows11-21h2-x64
10Resubmissions
02-08-2024 16:33
240802-t2wr5s1eqj 10Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-08-2024 16:33
Behavioral task
behavioral1
Sample
1.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Fallen.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Inte.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
LX64
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Server.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
hfs.exe
Resource
win11-20240730-en
Behavioral task
behavioral7
Sample
hfs_1.exe
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
hg
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
java
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
moren.exe
Resource
win11-20240802-en
General
-
Target
Inte.exe
-
Size
56KB
-
MD5
1ea2c756a0f0528d2e80ab204aa9de0b
-
SHA1
44177c8b4959a3b84ae65a5ea724a8e409b3dec1
-
SHA256
6d77d544364cdfaebd7252d14091653c903d0a11c34bddad60f5951da257a651
-
SHA512
ecaa88ae3a0b51ba9320870a6b7172a3f02c466571d79f7536ee3b557da14f0b268be39cc3fbeadae79f3de33d816a59737efdc7ce11d322d4891c82421d1de5
-
SSDEEP
768:KaYYkgyowxPDvHzWpHPhh+RT26A6PhSDFPlkFUHHnOsv7uZYDl:KaYYkgyowxbeHPyRT2wZSZPbnO9Wl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
vmware-vmx.exepid process 1260 vmware-vmx.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 2 IoCs
Processes:
Inte.exedescription ioc process File created C:\Windows\SysWOW64\vmware-vmx.exe Inte.exe File opened for modification C:\Windows\SysWOW64\vmware-vmx.exe Inte.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
vmware-vmx.exeInte.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmware-vmx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inte.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
vmware-vmx.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vmware-vmx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz vmware-vmx.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Inte.exedescription pid process Token: SeIncBasePriorityPrivilege 1484 Inte.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Inte.exedescription pid process target process PID 1484 wrote to memory of 2736 1484 Inte.exe cmd.exe PID 1484 wrote to memory of 2736 1484 Inte.exe cmd.exe PID 1484 wrote to memory of 2736 1484 Inte.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inte.exe"C:\Users\Admin\AppData\Local\Temp\Inte.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\Inte.exe > nul2⤵
- System Location Discovery: System Language Discovery
PID:2736
-
C:\Windows\SysWOW64\vmware-vmx.exeC:\Windows\SysWOW64\vmware-vmx.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD51ea2c756a0f0528d2e80ab204aa9de0b
SHA144177c8b4959a3b84ae65a5ea724a8e409b3dec1
SHA2566d77d544364cdfaebd7252d14091653c903d0a11c34bddad60f5951da257a651
SHA512ecaa88ae3a0b51ba9320870a6b7172a3f02c466571d79f7536ee3b557da14f0b268be39cc3fbeadae79f3de33d816a59737efdc7ce11d322d4891c82421d1de5