Analysis
-
max time kernel
110s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 03:06
Static task
static1
Behavioral task
behavioral1
Sample
3ef87f70a4874bf1c93c1b6ed54f9760N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3ef87f70a4874bf1c93c1b6ed54f9760N.exe
Resource
win10v2004-20240802-en
General
-
Target
3ef87f70a4874bf1c93c1b6ed54f9760N.exe
-
Size
31KB
-
MD5
3ef87f70a4874bf1c93c1b6ed54f9760
-
SHA1
fd0b82926bd618ca16f6aef685239fb6805be8dd
-
SHA256
a6f07a85295ee5e1c6ec2cd9e304c783353c308083b19baa86f36d08de31b815
-
SHA512
22f6e10e08fc4b6fa4728ee9e4a39281f0e224ec4425171fe6f05e451b9b40f56a8837726337953f585e78abbad3c16db84832d7f10c7f4e84c3dd64056cec45
-
SSDEEP
768:ZFnGJaxmc2+UuKVlgUoLbr7gtdgI2MyzNtRQtONlIwoHNV2XBFV72B4lA7PsEZ+b:3ytdgI2MyzNtRQtONlIwoHNV2XBFV72M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2804 hhcbrnaff.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 3ef87f70a4874bf1c93c1b6ed54f9760N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ef87f70a4874bf1c93c1b6ed54f9760N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhcbrnaff.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2804 1712 3ef87f70a4874bf1c93c1b6ed54f9760N.exe 29 PID 1712 wrote to memory of 2804 1712 3ef87f70a4874bf1c93c1b6ed54f9760N.exe 29 PID 1712 wrote to memory of 2804 1712 3ef87f70a4874bf1c93c1b6ed54f9760N.exe 29 PID 1712 wrote to memory of 2804 1712 3ef87f70a4874bf1c93c1b6ed54f9760N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ef87f70a4874bf1c93c1b6ed54f9760N.exe"C:\Users\Admin\AppData\Local\Temp\3ef87f70a4874bf1c93c1b6ed54f9760N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5a92986c49a51ad93a7b8f45827a6116c
SHA105a17e18198b91c253bf298aec1bd3c56b08647e
SHA25630b92b44129f542ac67159faf6fade1b71bc207786f175e2ddcc9a2e6c2d6c2f
SHA5121698aa9de0d405d2942d59074ba8e41656d14d71ebf619285167dedabb396c7829b32095acc878590dc90d63d690af65bfe35ccbe3ca9448dac357703a043a64