Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
95ad7adc39f0a63989f40182fed1679f276c9d9d4d244bd6a324df8cc31ad17f.exe
Resource
win7-20240704-en
General
-
Target
95ad7adc39f0a63989f40182fed1679f276c9d9d4d244bd6a324df8cc31ad17f.exe
-
Size
281KB
-
MD5
31065afdd3e4cd30f5821b3b2d560b8a
-
SHA1
994fa2c06b64b0325bf9c03131c7c2172f4f11a0
-
SHA256
95ad7adc39f0a63989f40182fed1679f276c9d9d4d244bd6a324df8cc31ad17f
-
SHA512
7e7f4266704c442e8580b8ffb445bcc2662a6cd37f4b48e541e71a60d560feaf0070058c3445ee2edffecd3c87a7f2b8158c48f579c1266b3e4ac7b57543a829
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfK:boSeGUA5YZazpXUmZhZ6SX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2612 a1punf5t2of.exe -
Loads dropped DLL 2 IoCs
pid Process 2728 95ad7adc39f0a63989f40182fed1679f276c9d9d4d244bd6a324df8cc31ad17f.exe 2612 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 95ad7adc39f0a63989f40182fed1679f276c9d9d4d244bd6a324df8cc31ad17f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95ad7adc39f0a63989f40182fed1679f276c9d9d4d244bd6a324df8cc31ad17f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2612 2728 95ad7adc39f0a63989f40182fed1679f276c9d9d4d244bd6a324df8cc31ad17f.exe 30 PID 2728 wrote to memory of 2612 2728 95ad7adc39f0a63989f40182fed1679f276c9d9d4d244bd6a324df8cc31ad17f.exe 30 PID 2728 wrote to memory of 2612 2728 95ad7adc39f0a63989f40182fed1679f276c9d9d4d244bd6a324df8cc31ad17f.exe 30 PID 2728 wrote to memory of 2612 2728 95ad7adc39f0a63989f40182fed1679f276c9d9d4d244bd6a324df8cc31ad17f.exe 30 PID 2728 wrote to memory of 2612 2728 95ad7adc39f0a63989f40182fed1679f276c9d9d4d244bd6a324df8cc31ad17f.exe 30 PID 2728 wrote to memory of 2612 2728 95ad7adc39f0a63989f40182fed1679f276c9d9d4d244bd6a324df8cc31ad17f.exe 30 PID 2728 wrote to memory of 2612 2728 95ad7adc39f0a63989f40182fed1679f276c9d9d4d244bd6a324df8cc31ad17f.exe 30 PID 2612 wrote to memory of 980 2612 a1punf5t2of.exe 32 PID 2612 wrote to memory of 980 2612 a1punf5t2of.exe 32 PID 2612 wrote to memory of 980 2612 a1punf5t2of.exe 32 PID 2612 wrote to memory of 980 2612 a1punf5t2of.exe 32 PID 2612 wrote to memory of 980 2612 a1punf5t2of.exe 32 PID 2612 wrote to memory of 980 2612 a1punf5t2of.exe 32 PID 2612 wrote to memory of 980 2612 a1punf5t2of.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\95ad7adc39f0a63989f40182fed1679f276c9d9d4d244bd6a324df8cc31ad17f.exe"C:\Users\Admin\AppData\Local\Temp\95ad7adc39f0a63989f40182fed1679f276c9d9d4d244bd6a324df8cc31ad17f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD50a23edb1efb4073746221414c0916ef3
SHA1002dad49466e849b20bf998bdbda69d1e8cb23ac
SHA25677789456c1dbeca9fd59a846bc828a9f02a83d23d79c1f949d3afeae191c1a42
SHA512fd64d92b184d1404de91bbb09d35b12c3b04b4f4ccb9a459cb67f6aa993cca3b42fff4072eb198e373e1a440f60a6028ab185b1371b559169c2a90ca0be3bb70