Analysis
-
max time kernel
35s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 13:20
Static task
static1
Behavioral task
behavioral1
Sample
af7725b565f71dcbfe2f9bcc60e3f340N.exe
Resource
win7-20240708-en
General
-
Target
af7725b565f71dcbfe2f9bcc60e3f340N.exe
-
Size
282KB
-
MD5
af7725b565f71dcbfe2f9bcc60e3f340
-
SHA1
898d60b932347a63ccf1ec9a01803010fafd4be0
-
SHA256
1a84b72b5406476c01592b4280823ab4da801383000155e8e809df6508b1dedc
-
SHA512
0d9767a4ce9cfbd5c7542645e59384814cf45336e5a44ad013b2539b198df168a7003e7fcd7e00cd62f817f30c6d9dd0ac5082a8a490ba28811f0b3dd0eb3cb0
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfjT:boSeGUA5YZazpXUmZhZ6SK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2716 a1punf5t2of.exe -
Loads dropped DLL 2 IoCs
pid Process 2360 af7725b565f71dcbfe2f9bcc60e3f340N.exe 2716 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" af7725b565f71dcbfe2f9bcc60e3f340N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af7725b565f71dcbfe2f9bcc60e3f340N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2716 2360 af7725b565f71dcbfe2f9bcc60e3f340N.exe 31 PID 2360 wrote to memory of 2716 2360 af7725b565f71dcbfe2f9bcc60e3f340N.exe 31 PID 2360 wrote to memory of 2716 2360 af7725b565f71dcbfe2f9bcc60e3f340N.exe 31 PID 2360 wrote to memory of 2716 2360 af7725b565f71dcbfe2f9bcc60e3f340N.exe 31 PID 2360 wrote to memory of 2716 2360 af7725b565f71dcbfe2f9bcc60e3f340N.exe 31 PID 2360 wrote to memory of 2716 2360 af7725b565f71dcbfe2f9bcc60e3f340N.exe 31 PID 2360 wrote to memory of 2716 2360 af7725b565f71dcbfe2f9bcc60e3f340N.exe 31 PID 2716 wrote to memory of 2668 2716 a1punf5t2of.exe 32 PID 2716 wrote to memory of 2668 2716 a1punf5t2of.exe 32 PID 2716 wrote to memory of 2668 2716 a1punf5t2of.exe 32 PID 2716 wrote to memory of 2668 2716 a1punf5t2of.exe 32 PID 2716 wrote to memory of 2668 2716 a1punf5t2of.exe 32 PID 2716 wrote to memory of 2668 2716 a1punf5t2of.exe 32 PID 2716 wrote to memory of 2668 2716 a1punf5t2of.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\af7725b565f71dcbfe2f9bcc60e3f340N.exe"C:\Users\Admin\AppData\Local\Temp\af7725b565f71dcbfe2f9bcc60e3f340N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD54f055e73394029ee3e38f32c92b23b6e
SHA1a4f3626c3f8eebd3bd756385eae0f11c98328c60
SHA25686929b616d9b4029bdc169993ff6bee69179d518ac32b1cfe7a6564aeb39c777
SHA51209f682a6345b88b43d47ce652111daf9e55f7262bad43ec4a66a3c9ca358c871f8dfe156e95a0cb7a8e5f3075ff4b67696565ea04ba662120f04821ea332e345