Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 01:33
Static task
static1
Behavioral task
behavioral1
Sample
ad5c7909c7f25a6b62ba1cae86a7de3402151fb46e69a18f8f747cd048d6c364.exe
Resource
win7-20240708-en
General
-
Target
ad5c7909c7f25a6b62ba1cae86a7de3402151fb46e69a18f8f747cd048d6c364.exe
-
Size
282KB
-
MD5
384d2f7e3603448b49c85f7fc62c6c2f
-
SHA1
4f661ae7149bf1b64cb1e82aa4cd451e184a1fe7
-
SHA256
ad5c7909c7f25a6b62ba1cae86a7de3402151fb46e69a18f8f747cd048d6c364
-
SHA512
d7d43b4e53f2dd5284a72a5a0943487728eca6913a7dbe62338dcc53751d0a4d00f5f4385889a1a8fd23ea266e606fedffb3fbb784cddb3564822f4ddb17dc9d
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfh:boSeGUA5YZazpXUmZhZ6SY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2840 a1punf5t2of.exe -
Loads dropped DLL 2 IoCs
pid Process 2980 ad5c7909c7f25a6b62ba1cae86a7de3402151fb46e69a18f8f747cd048d6c364.exe 2840 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" ad5c7909c7f25a6b62ba1cae86a7de3402151fb46e69a18f8f747cd048d6c364.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad5c7909c7f25a6b62ba1cae86a7de3402151fb46e69a18f8f747cd048d6c364.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2840 2980 ad5c7909c7f25a6b62ba1cae86a7de3402151fb46e69a18f8f747cd048d6c364.exe 31 PID 2980 wrote to memory of 2840 2980 ad5c7909c7f25a6b62ba1cae86a7de3402151fb46e69a18f8f747cd048d6c364.exe 31 PID 2980 wrote to memory of 2840 2980 ad5c7909c7f25a6b62ba1cae86a7de3402151fb46e69a18f8f747cd048d6c364.exe 31 PID 2980 wrote to memory of 2840 2980 ad5c7909c7f25a6b62ba1cae86a7de3402151fb46e69a18f8f747cd048d6c364.exe 31 PID 2980 wrote to memory of 2840 2980 ad5c7909c7f25a6b62ba1cae86a7de3402151fb46e69a18f8f747cd048d6c364.exe 31 PID 2980 wrote to memory of 2840 2980 ad5c7909c7f25a6b62ba1cae86a7de3402151fb46e69a18f8f747cd048d6c364.exe 31 PID 2980 wrote to memory of 2840 2980 ad5c7909c7f25a6b62ba1cae86a7de3402151fb46e69a18f8f747cd048d6c364.exe 31 PID 2840 wrote to memory of 2608 2840 a1punf5t2of.exe 32 PID 2840 wrote to memory of 2608 2840 a1punf5t2of.exe 32 PID 2840 wrote to memory of 2608 2840 a1punf5t2of.exe 32 PID 2840 wrote to memory of 2608 2840 a1punf5t2of.exe 32 PID 2840 wrote to memory of 2608 2840 a1punf5t2of.exe 32 PID 2840 wrote to memory of 2608 2840 a1punf5t2of.exe 32 PID 2840 wrote to memory of 2608 2840 a1punf5t2of.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad5c7909c7f25a6b62ba1cae86a7de3402151fb46e69a18f8f747cd048d6c364.exe"C:\Users\Admin\AppData\Local\Temp\ad5c7909c7f25a6b62ba1cae86a7de3402151fb46e69a18f8f747cd048d6c364.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD59874e3b43ca35b1e9e26ec2adf405083
SHA1ba57638e351e59909a894387d18eee7bf7096ea9
SHA2560c538abfab942c1cee0bc85d3825fb75244c75d6e90358fd243c768088d43645
SHA512dd0f33aaa67313fe2278034fbe52cdeb5ad5e5e96089fae0efbd55b1da26a0fc2eb9c3b357f2832255a5c0813ddf02130ecc98618e53e180b1d3a75d2b10c61b