Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
929f775f2fc187385758ca74613c2340N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
929f775f2fc187385758ca74613c2340N.exe
Resource
win10v2004-20240802-en
General
-
Target
929f775f2fc187385758ca74613c2340N.exe
-
Size
179KB
-
MD5
929f775f2fc187385758ca74613c2340
-
SHA1
37cfc1032389f42672ffe4dad730e96b5afa8ce8
-
SHA256
d910cca45030e1c5fc540eea2ef8d6b9d2cf7acc7cba7b9f741830c3d77b3c90
-
SHA512
2fe44b283bb1c30944196952954778292f43570dbbd9785e94a930a2b004bfaa7823fc6b8052f52ad5da7a941fde82f8f8c3214a614f748b2f5ce97e9a8dca66
-
SSDEEP
3072:pXTTASJKf2n5AxE2NpxOa2XdU2QF4s5XgIDFyHb8kHofL/09rGB:pvASJKenie2xT2NU2OTFQb8Fb0IB
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent6 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\4B8BF0~1.EXE" svchost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Eset\Nod svchost.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Avira svchost.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\AVAST Software\Avast svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2420 set thread context of 2532 2420 929f775f2fc187385758ca74613c2340N.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 929f775f2fc187385758ca74613c2340N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2532 2420 929f775f2fc187385758ca74613c2340N.exe 30 PID 2420 wrote to memory of 2532 2420 929f775f2fc187385758ca74613c2340N.exe 30 PID 2420 wrote to memory of 2532 2420 929f775f2fc187385758ca74613c2340N.exe 30 PID 2420 wrote to memory of 2532 2420 929f775f2fc187385758ca74613c2340N.exe 30 PID 2420 wrote to memory of 2532 2420 929f775f2fc187385758ca74613c2340N.exe 30 PID 2420 wrote to memory of 2532 2420 929f775f2fc187385758ca74613c2340N.exe 30 PID 2420 wrote to memory of 2532 2420 929f775f2fc187385758ca74613c2340N.exe 30 PID 2420 wrote to memory of 2532 2420 929f775f2fc187385758ca74613c2340N.exe 30 PID 2420 wrote to memory of 2532 2420 929f775f2fc187385758ca74613c2340N.exe 30 PID 2420 wrote to memory of 2532 2420 929f775f2fc187385758ca74613c2340N.exe 30 PID 2420 wrote to memory of 2532 2420 929f775f2fc187385758ca74613c2340N.exe 30 PID 2420 wrote to memory of 2532 2420 929f775f2fc187385758ca74613c2340N.exe 30 PID 2420 wrote to memory of 2488 2420 929f775f2fc187385758ca74613c2340N.exe 32 PID 2420 wrote to memory of 2488 2420 929f775f2fc187385758ca74613c2340N.exe 32 PID 2420 wrote to memory of 2488 2420 929f775f2fc187385758ca74613c2340N.exe 32 PID 2420 wrote to memory of 2488 2420 929f775f2fc187385758ca74613c2340N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\929f775f2fc187385758ca74613c2340N.exe"C:\Users\Admin\AppData\Local\Temp\929f775f2fc187385758ca74613c2340N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\svchost.exeC:\ProgramData\4b8bf0bh42.exe2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\jsb3DC7.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\929f775f2fc187385758ca74613c2340N.exe""2⤵
- System Location Discovery: System Language Discovery
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD5018f0b95ddd4837ae7e401b41c0a26c6
SHA1f0c87c43e72000da9d19273d78c6cf64ac127144
SHA256fdac36f0d753f5ba6c93e2fd8aacc6836581f9068586ac9208df93abb391b21d
SHA512e8b4b2247320dabc1fe736706d99436aa4fa84795342ec98ef8d30926214e65f1d4fd0d752cb760cf8181256383b91a4bbffabed9b424a92aa7fcbba56ad47e5