Analysis
-
max time kernel
74s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/08/2024, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
4c3049f8e220c2264692cb192b741a30N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4c3049f8e220c2264692cb192b741a30N.exe
Resource
win10v2004-20240802-en
General
-
Target
4c3049f8e220c2264692cb192b741a30N.exe
-
Size
898KB
-
MD5
4c3049f8e220c2264692cb192b741a30
-
SHA1
46c735f574daaa3e6605ef4c54c8189f5722ff2a
-
SHA256
7f74b2c86e9f5706fc44c8d5093a027d1cd5856006aa80f270efae26d55c9131
-
SHA512
b13dc855c3c06b56aa9bf181680b69003839adeaf16c5372912004a7bf42882e340c445c58e24e083692b4dcbb15c3e0cf244664458ccdd0dd7668b440277e0a
-
SSDEEP
24576:juDXTIGaPhEYzUzA0aVuDXTIGaPhEYzUzA0bZB:KDjlabwz9jDjlabwz9dB
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2184 clamer.exe 2740 thkdh.exe 2684 usne.exe -
Loads dropped DLL 1 IoCs
pid Process 1460 cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Test Task17.job thkdh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thkdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language usne.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2480 wrote to memory of 1460 2480 4c3049f8e220c2264692cb192b741a30N.exe 29 PID 2480 wrote to memory of 1460 2480 4c3049f8e220c2264692cb192b741a30N.exe 29 PID 2480 wrote to memory of 1460 2480 4c3049f8e220c2264692cb192b741a30N.exe 29 PID 1460 wrote to memory of 2184 1460 cmd.exe 31 PID 1460 wrote to memory of 2184 1460 cmd.exe 31 PID 1460 wrote to memory of 2184 1460 cmd.exe 31 PID 2184 wrote to memory of 2740 2184 clamer.exe 32 PID 2184 wrote to memory of 2740 2184 clamer.exe 32 PID 2184 wrote to memory of 2740 2184 clamer.exe 32 PID 2184 wrote to memory of 2740 2184 clamer.exe 32 PID 2908 wrote to memory of 2684 2908 taskeng.exe 34 PID 2908 wrote to memory of 2684 2908 taskeng.exe 34 PID 2908 wrote to memory of 2684 2908 taskeng.exe 34 PID 2908 wrote to memory of 2684 2908 taskeng.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c3049f8e220c2264692cb192b741a30N.exe"C:\Users\Admin\AppData\Local\Temp\4c3049f8e220c2264692cb192b741a30N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\clamer.execlamer.exe -priverdD3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\thkdh.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\thkdh.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0458DA6C-F121-4D07-A86D-470395B77E9E} S-1-5-21-2257386474-3982792636-3902186748-1000:CTBHAMHL\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\ProgramData\eccdejd\usne.exeC:\ProgramData\eccdejd\usne.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37B
MD528151380c82f5de81c1323171201e013
SHA1ae515d813ba2b17c8c5ebdae196663dc81c26d3c
SHA256bb8582ce28db923f243c8d7a3f2eccb0ed25930f5b5c94133af8eefb57a8231d
SHA51246b29cba0dc813de0c58d2d83dc298fa677921fd1f19f41e2ed3c7909c497fab2236d10a9ae59b3f38e49cf167964ede45e15543673a1e0843266242b8e26253
-
Filesize
453KB
MD5fb30b403c1fa1d57fb65dc8b8e00e75c
SHA1161cf9d271aee2d7d2f7a0a5d0001830929c300b
SHA25683d9579e6b71561a9dafbdd309b4dbfaddf816c7ccc25e4672c8d9dfb14b6673
SHA512d0d15e51527bcfad38c01c46b4c43257407ead9c328bc4d48d21c9702c16872e52509e014444e78cd22f1ad96c11a88d281c2a745df0a4ca21243352f879de85
-
Filesize
16KB
MD5e7d405eec8052898f4d2b0440a6b72c9
SHA158cf7bfcec81faf744682f9479b905feed8e6e68
SHA256b63a0e5f93b26ad0eeb9efba66691f3b7e7f51e93a2f0098bde43833f7a24cc2
SHA512324507084bd56f7102459efe7b3c2d2560f4e89ed03ec4a38539ebb71bccdf1def7bc961c259f9b02f4b2be0d5e095136c9efcd5fc3108af3dc61d24970d6121
-
Filesize
218B
MD530c2174e5418e3a0a0067ecdca8a29e0
SHA173ee08de72530d40f99e8a6f92bc075ce376874c
SHA2561333ddcff3e556d62efd086fb10853a544fe3f8e9d59ebc831c9f538aadf1a23
SHA512ed91fefe82558199c5395859c54278ec6ee4c300dd520984b21606ada562b2f94b831dfc36797c26c1848f4067fd3d6d65486740fc7e73e1dcdc33503ffcc266