Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
a91efe5e0ada9f637bcfdf9da117e490N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a91efe5e0ada9f637bcfdf9da117e490N.exe
Resource
win10v2004-20240802-en
General
-
Target
a91efe5e0ada9f637bcfdf9da117e490N.exe
-
Size
176KB
-
MD5
a91efe5e0ada9f637bcfdf9da117e490
-
SHA1
7e347fbb376b7f83300b4338f8c87fe4f7b95adb
-
SHA256
b12b03fcc165648292cd21e6e504f92f611a4a2fb0f865929b67b47580390da2
-
SHA512
0d6a538f456c88903c22fa2bb3f0192036808ef4cce76a4b0e43d881d460adf8f053f3da1662ca484b7a2f2e6d619617d5c01cfc11f45d3d3f46aa9ffede6c29
-
SSDEEP
3072:s9E4Wgbr57BVFqmx1E9Hqmz674Qbf6xET/nhqCoNWDY1TuDBujfgY1LRQBAhHuYK:+0MJBVlx+Vf274Q2xqhxoNH1Ti5YtuY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1832 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 3020 MuiUdt32.exe 2216 ~F90E.tmp 2768 cmstpugc.exe -
Loads dropped DLL 3 IoCs
pid Process 2360 a91efe5e0ada9f637bcfdf9da117e490N.exe 2360 a91efe5e0ada9f637bcfdf9da117e490N.exe 3020 MuiUdt32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\regskmgr = "C:\\Users\\Admin\\AppData\\Roaming\\mtstcont\\MuiUdt32.exe" a91efe5e0ada9f637bcfdf9da117e490N.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\cmstpugc.exe a91efe5e0ada9f637bcfdf9da117e490N.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstpugc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a91efe5e0ada9f637bcfdf9da117e490N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MuiUdt32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3020 MuiUdt32.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE 2768 cmstpugc.exe 1228 Explorer.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2360 wrote to memory of 3020 2360 a91efe5e0ada9f637bcfdf9da117e490N.exe 31 PID 2360 wrote to memory of 3020 2360 a91efe5e0ada9f637bcfdf9da117e490N.exe 31 PID 2360 wrote to memory of 3020 2360 a91efe5e0ada9f637bcfdf9da117e490N.exe 31 PID 2360 wrote to memory of 3020 2360 a91efe5e0ada9f637bcfdf9da117e490N.exe 31 PID 3020 wrote to memory of 2216 3020 MuiUdt32.exe 32 PID 3020 wrote to memory of 2216 3020 MuiUdt32.exe 32 PID 3020 wrote to memory of 2216 3020 MuiUdt32.exe 32 PID 3020 wrote to memory of 2216 3020 MuiUdt32.exe 32 PID 2216 wrote to memory of 1228 2216 ~F90E.tmp 21 PID 2360 wrote to memory of 1832 2360 a91efe5e0ada9f637bcfdf9da117e490N.exe 34 PID 2360 wrote to memory of 1832 2360 a91efe5e0ada9f637bcfdf9da117e490N.exe 34 PID 2360 wrote to memory of 1832 2360 a91efe5e0ada9f637bcfdf9da117e490N.exe 34 PID 2360 wrote to memory of 1832 2360 a91efe5e0ada9f637bcfdf9da117e490N.exe 34 PID 1832 wrote to memory of 2784 1832 cmd.exe 36 PID 1832 wrote to memory of 2784 1832 cmd.exe 36 PID 1832 wrote to memory of 2784 1832 cmd.exe 36 PID 1832 wrote to memory of 2784 1832 cmd.exe 36 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2784 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\a91efe5e0ada9f637bcfdf9da117e490N.exe"C:\Users\Admin\AppData\Local\Temp\a91efe5e0ada9f637bcfdf9da117e490N.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Roaming\mtstcont\MuiUdt32.exe"C:\Users\Admin\AppData\Roaming\mtstcont\MuiUdt32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\~F90E.tmp"C:\Users\Admin\AppData\Local\Temp\~F90E.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216
-
-
-
C:\Windows\SysWOW64\cmd.exe/C 259455324.cmd3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "a91efe5e0ada9f637bcfdf9da117e490N.exe"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2784
-
-
-
-
C:\Windows\SysWOW64\cmstpugc.exeC:\Windows\SysWOW64\cmstpugc.exe -k1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198B
MD5c9ba42f5ee7e20bf84e73fac573830ff
SHA191af7786e61b3ae8cfaf1302db79bc0793c09aba
SHA2561382f7673903b961a857f26463a1989ad0011e19820dcb8ebed6f030d6bac0c9
SHA5126bf9303fca07d2dd86cc377830282a27c52aac69ea611aff471b4f65b3bf4eb59ad9b2b63cb170261b9ca5b9250a34efa6a5b31bb796837119038882bad3fe1b
-
Filesize
176KB
MD5a91efe5e0ada9f637bcfdf9da117e490
SHA17e347fbb376b7f83300b4338f8c87fe4f7b95adb
SHA256b12b03fcc165648292cd21e6e504f92f611a4a2fb0f865929b67b47580390da2
SHA5120d6a538f456c88903c22fa2bb3f0192036808ef4cce76a4b0e43d881d460adf8f053f3da1662ca484b7a2f2e6d619617d5c01cfc11f45d3d3f46aa9ffede6c29
-
Filesize
6KB
MD5bf16ffc0fc2f9793ddc7cf52a5e1d73f
SHA19b6379e7f12d7438091fdb291680313dfd77c7b1
SHA25668eb2116f720064a1d242332c6f9317d4fc68366a79fce4bc0e0dbb20065daba
SHA512a5d39505f8f2181caa291276b27a5e1a336470db46b8a4d7008feae1e176d0121ff77172a8852a814212ae7ed004afcff0c0ed8caa38fadd8b1137661cb473e5
-
Filesize
176KB
MD5879d78d7a8a21e3ec680ebd26cf8d9f4
SHA1b5f196f414a28196f091d81487ab626f03328557
SHA256ca47a78e350d547f2a5329050948e8cff45446eb77960e0a70456eb78ecbe76b
SHA512e1a431732a4ac16cbe23ce3960f1c166df8cd1e2bae4a1054597b617f50c70ab454d603b6db26a2a70aace7feb91c0e0642f3ab4818fb5ad7b6c35b0e551f9b6