Analysis
-
max time kernel
30s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 22:39
Behavioral task
behavioral1
Sample
ba2f6eed79d9175437127c219e6b46b0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ba2f6eed79d9175437127c219e6b46b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
ba2f6eed79d9175437127c219e6b46b0N.exe
-
Size
135KB
-
MD5
ba2f6eed79d9175437127c219e6b46b0
-
SHA1
6c192d73c56a75fd98cb60b65a445fba1ad4ccc8
-
SHA256
36d302894a860391d8153387facbdcd46ca6ca581187e9d25a74b5082c4f27ef
-
SHA512
9718216b57d981f663dec0d1c3cf380b6d42e58c961ff8cec5a750e2fffe2a88429dd948ed2a3e1fcf1b0a50a79cbf4776cc69266c0a6b3bb73c6dfd29c44b45
-
SSDEEP
1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SO0:YfU/WF6QMauSuiWNi9eNOl0007NZIO0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2868 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3036 wuauclt.exe -
Loads dropped DLL 1 IoCs
pid Process 3016 ba2f6eed79d9175437127c219e6b46b0N.exe -
resource yara_rule behavioral1/memory/3016-4-0x0000000000CF0000-0x0000000000D18000-memory.dmp upx behavioral1/files/0x0008000000018d89-6.dat upx behavioral1/memory/3036-7-0x0000000000AD0000-0x0000000000AF8000-memory.dmp upx behavioral1/memory/3016-9-0x0000000000CF0000-0x0000000000D18000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\wuauclt.exe\" /run" ba2f6eed79d9175437127c219e6b46b0N.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba2f6eed79d9175437127c219e6b46b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3036 3016 ba2f6eed79d9175437127c219e6b46b0N.exe 30 PID 3016 wrote to memory of 3036 3016 ba2f6eed79d9175437127c219e6b46b0N.exe 30 PID 3016 wrote to memory of 3036 3016 ba2f6eed79d9175437127c219e6b46b0N.exe 30 PID 3016 wrote to memory of 3036 3016 ba2f6eed79d9175437127c219e6b46b0N.exe 30 PID 3016 wrote to memory of 2868 3016 ba2f6eed79d9175437127c219e6b46b0N.exe 32 PID 3016 wrote to memory of 2868 3016 ba2f6eed79d9175437127c219e6b46b0N.exe 32 PID 3016 wrote to memory of 2868 3016 ba2f6eed79d9175437127c219e6b46b0N.exe 32 PID 3016 wrote to memory of 2868 3016 ba2f6eed79d9175437127c219e6b46b0N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba2f6eed79d9175437127c219e6b46b0N.exe"C:\Users\Admin\AppData\Local\Temp\ba2f6eed79d9175437127c219e6b46b0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\ProgramData\Update\wuauclt.exe"C:\ProgramData\Update\wuauclt.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3036
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\ba2f6eed79d9175437127c219e6b46b0N.exe" >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD53a2e106889de301cea686334911ca1ea
SHA142f9a5114a9a40fc119c9cdcfd8ee7fd1a3d0104
SHA256c913f61e6ab8ef4c9d995ee7cf8e070d869762f48b8c79f9088fa69413bda92d
SHA51206efb7f498f42484068d38fb1e0821524d6e4ac92718cec50b26bf089535bf646762e74aee7fe17a9641eefba86ff9ed50747aacdaf880c46870ea0b43ac29b1