Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 23:35
Behavioral task
behavioral1
Sample
2aa9c7d17bf3803aced7edef0da12c50N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2aa9c7d17bf3803aced7edef0da12c50N.exe
Resource
win10v2004-20240802-en
General
-
Target
2aa9c7d17bf3803aced7edef0da12c50N.exe
-
Size
29KB
-
MD5
2aa9c7d17bf3803aced7edef0da12c50
-
SHA1
c77a8dcd856a1ac02c261b686bb147efaf8b86fd
-
SHA256
560d12fec16a7a0083184c1a5b932cf8a4083138ad7cc17814b95e2f4371c296
-
SHA512
7e72949fa7ea253dd7665fdd6189a0e1ff52c0e409c4000ea775694605d38558f31ceceb83863a6507e1f80549fc84d4ca18961d612321686c49fd8dae19d5fc
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/uH:AEwVs+0jNDY1qi/qW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1956 services.exe -
resource yara_rule behavioral1/memory/2488-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2488-4-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x002b000000018eb2-7.dat upx behavioral1/memory/2488-16-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1956-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1956-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1956-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1956-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1956-35-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1956-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1956-42-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1956-47-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1956-52-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2488-53-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1956-54-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1956-59-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x002b000000018eb8-72.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 2aa9c7d17bf3803aced7edef0da12c50N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\java.exe 2aa9c7d17bf3803aced7edef0da12c50N.exe File created C:\Windows\services.exe 2aa9c7d17bf3803aced7edef0da12c50N.exe File opened for modification C:\Windows\java.exe 2aa9c7d17bf3803aced7edef0da12c50N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2aa9c7d17bf3803aced7edef0da12c50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1956 2488 2aa9c7d17bf3803aced7edef0da12c50N.exe 28 PID 2488 wrote to memory of 1956 2488 2aa9c7d17bf3803aced7edef0da12c50N.exe 28 PID 2488 wrote to memory of 1956 2488 2aa9c7d17bf3803aced7edef0da12c50N.exe 28 PID 2488 wrote to memory of 1956 2488 2aa9c7d17bf3803aced7edef0da12c50N.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aa9c7d17bf3803aced7edef0da12c50N.exe"C:\Users\Admin\AppData\Local\Temp\2aa9c7d17bf3803aced7edef0da12c50N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD52ae22de7d76b333c080640d5dbb496d3
SHA1e630e41418c57173d2cd023d27435f50d0641470
SHA256737c86cfd9019f87422f84580d3f17ff3d0a9cf5c6edaca13f9828a2c40e03e9
SHA5128144ea099d7d664f98418503de164e5d5161b17ae83dbeade888a1fdfc49efc3eb0700ad69cd1adfba9590307acfc56d98fbb9328102247c424dc7dbb625593a
-
Filesize
352B
MD5f2c2945fb6c8517dcda863e9abe885fe
SHA11586d4aea84c5b19b78dbf714226b9782984c349
SHA256cdc16a56381e01d53e0849051710c5799411ee5ac1b70f9a63848476507021b3
SHA512d221e78d36b8c218347be337f57cc6081fdac1c761bf70daeb370864e539e395196d846bb5ccec6110ffefc1e887af8c1825608ee4aa35bc323854cd848703cf
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2