Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-08-2024 06:56
Static task
static1
Behavioral task
behavioral1
Sample
6120ee19b83bad670d452fa60cd9c860N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6120ee19b83bad670d452fa60cd9c860N.exe
Resource
win10v2004-20240802-en
General
-
Target
6120ee19b83bad670d452fa60cd9c860N.exe
-
Size
404KB
-
MD5
6120ee19b83bad670d452fa60cd9c860
-
SHA1
02cfe3deea875012b2e9aa242fada183595c7e1b
-
SHA256
6d78e38d4be42961f320591ad39d48d04a50e518fa94a9019a9cf77f1eb1b2db
-
SHA512
53f348253d769b69a77d345810daf36555e5b1bed0c8c4f127b8b10b0bf97ccdc88bf1ca1b9f6badd96b42ce970058db4976d6efa97cc071a74ef2a395b26d01
-
SSDEEP
6144:4jlYKRF/LReWAsUysPO5xKM58f31SK0zxHX2BFD7TzoyCUMR1Pj6XQld:4jauDReWKgxKM5K31IxHmlPlMRt++d
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2760 couxuc.exe -
Loads dropped DLL 2 IoCs
pid Process 1188 6120ee19b83bad670d452fa60cd9c860N.exe 1188 6120ee19b83bad670d452fa60cd9c860N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\couxuc.exe" couxuc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6120ee19b83bad670d452fa60cd9c860N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language couxuc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2760 1188 6120ee19b83bad670d452fa60cd9c860N.exe 30 PID 1188 wrote to memory of 2760 1188 6120ee19b83bad670d452fa60cd9c860N.exe 30 PID 1188 wrote to memory of 2760 1188 6120ee19b83bad670d452fa60cd9c860N.exe 30 PID 1188 wrote to memory of 2760 1188 6120ee19b83bad670d452fa60cd9c860N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6120ee19b83bad670d452fa60cd9c860N.exe"C:\Users\Admin\AppData\Local\Temp\6120ee19b83bad670d452fa60cd9c860N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\ProgramData\couxuc.exe"C:\ProgramData\couxuc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404KB
MD547141f79794befc3fcc642efc118725b
SHA15ee646761e3c2f4e70291d7508ab89bcecbd1428
SHA256567c9369f6ab4ecb6a995c50161254c88c88ee13d608595ef507315880597c12
SHA5124beaa1ad3391275ceab496fb5b1de782ba65da4b76c0d2f063ad1ddc320793a0b3f9b9c1c5b751f4aa354914de117aab1c542bf9059742f976d3d2ade027b605
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
267KB
MD5f183bb6d5299caa04f3831da2a299a0d
SHA14be6b2b05aa19ab722d872f528068d5c5ebfc97f
SHA25624ef820e02d8b3e67b5feb074272e43670598bb5257b6ab0377e72b36f3b68ce
SHA512532af72fdfa4816ad5b1818aa2dc601ab465bd94c4cb2933d4a548f5af18740b7f3a12aef36b81ea52cada4d2f21b0de5dd0e8a2061796d7f163722fc136ea89