Analysis
-
max time kernel
150s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe
Resource
win10v2004-20240802-en
General
-
Target
5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe
-
Size
484KB
-
MD5
d8bf55b4de322bb2ff56bc5a01a5a15d
-
SHA1
8c68951716a74991555b63f497cc9e45a22ccb52
-
SHA256
5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755
-
SHA512
16ca637b299f1ad3cc9d23ecdb6d6f3daac23ef5bbff6b48a1080f73486de5511c1ba0b11f00deb93fe53da67c10412d9592404381a19356d69b95683b4a920e
-
SSDEEP
12288:jLPkCDt1EG2XVekhdeTOcguBF7A0pF7/PmUl:jLPkQ1bqAGW3cUCU
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2360 rasasort.exe 2276 ~F5B4.tmp 3048 odbchost.exe -
Loads dropped DLL 3 IoCs
pid Process 1400 5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe 1400 5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe 2360 rasasort.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\odbchost = "C:\\Users\\Admin\\AppData\\Roaming\\ipcocopy\\rasasort.exe" 5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\odbchost.exe 5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2940 1400 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rasasort.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language odbchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2360 rasasort.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE 3048 odbchost.exe 1184 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2360 rasasort.exe Token: SeShutdownPrivilege 1184 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2360 1400 5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe 29 PID 1400 wrote to memory of 2360 1400 5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe 29 PID 1400 wrote to memory of 2360 1400 5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe 29 PID 1400 wrote to memory of 2360 1400 5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe 29 PID 2360 wrote to memory of 2276 2360 rasasort.exe 30 PID 2360 wrote to memory of 2276 2360 rasasort.exe 30 PID 2360 wrote to memory of 2276 2360 rasasort.exe 30 PID 2360 wrote to memory of 2276 2360 rasasort.exe 30 PID 2276 wrote to memory of 1184 2276 ~F5B4.tmp 20 PID 1400 wrote to memory of 2940 1400 5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe 32 PID 1400 wrote to memory of 2940 1400 5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe 32 PID 1400 wrote to memory of 2940 1400 5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe 32 PID 1400 wrote to memory of 2940 1400 5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe"C:\Users\Admin\AppData\Local\Temp\5bfcd89c0cb191974e9aff5f4097a6930ae7942c924a55c509d0c82fab2cb755.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Roaming\ipcocopy\rasasort.exe"C:\Users\Admin\AppData\Roaming\ipcocopy"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\~F5B4.tmp1184 496136 2360 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2276
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 2523⤵
- Program crash
PID:2940
-
-
-
C:\Windows\SysWOW64\odbchost.exeC:\Windows\SysWOW64\odbchost.exe -s1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5aac3165ece2959f39ff98334618d10d9
SHA1020a191bfdc70c1fbd3bf74cd7479258bd197f51
SHA25696fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974
SHA5129eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf
-
Filesize
484KB
MD53ddc3c0a2763a314eb7118b770323507
SHA1a7d0839eeb95cacc02748092e5bc4c5e62977430
SHA25665b78822fbacb60ff8b205a5dd93b1e9d5ef07a9cf097d918f2fbfcb7610b325
SHA51280e7216a564d254b4f905d7bca7f733832e544aabd9d52b24bdd4d874f16afd3ecee9f5e32ab040f3766ac187dcc421be8972ba4d51aeded4450fc09cf783764