Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 18:20
Behavioral task
behavioral1
Sample
beb3deaaaf74b0db0abbf28bbc90bba0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
beb3deaaaf74b0db0abbf28bbc90bba0N.exe
Resource
win10v2004-20240802-en
General
-
Target
beb3deaaaf74b0db0abbf28bbc90bba0N.exe
-
Size
41KB
-
MD5
beb3deaaaf74b0db0abbf28bbc90bba0
-
SHA1
8355cf5f2f6924b47a90df21ce2e56c8144e7e90
-
SHA256
a59cbf2b9f778a9060ea0df6f07ad2b405d19d33b54e2b7347d083f347156ea6
-
SHA512
69cb431a993c8d6e8362fdbefdcebc478972b76135eef4033cd886c766aebbb47bf182cbe17fc6c401a3a777fd3df79d921e2a986d6f73b4741869a1551494f4
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 740 services.exe -
resource yara_rule behavioral1/memory/2524-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/740-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x00070000000193f7-8.dat upx behavioral1/memory/2524-17-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/740-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/740-23-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/740-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/740-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/740-37-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/740-42-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/740-44-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/740-49-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/740-54-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2524-55-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/740-56-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2524-60-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/740-61-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x00070000000194d2-71.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" beb3deaaaf74b0db0abbf28bbc90bba0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe beb3deaaaf74b0db0abbf28bbc90bba0N.exe File opened for modification C:\Windows\java.exe beb3deaaaf74b0db0abbf28bbc90bba0N.exe File created C:\Windows\java.exe beb3deaaaf74b0db0abbf28bbc90bba0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beb3deaaaf74b0db0abbf28bbc90bba0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 740 2524 beb3deaaaf74b0db0abbf28bbc90bba0N.exe 29 PID 2524 wrote to memory of 740 2524 beb3deaaaf74b0db0abbf28bbc90bba0N.exe 29 PID 2524 wrote to memory of 740 2524 beb3deaaaf74b0db0abbf28bbc90bba0N.exe 29 PID 2524 wrote to memory of 740 2524 beb3deaaaf74b0db0abbf28bbc90bba0N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\beb3deaaaf74b0db0abbf28bbc90bba0N.exe"C:\Users\Admin\AppData\Local\Temp\beb3deaaaf74b0db0abbf28bbc90bba0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5fa55fdc95bc3f9d9673dc81436b95174
SHA142fab6428a44411b7dce3ebdca342bf6f3fd0160
SHA25656222efc72a4f6a4294f9f9fecec417542d2be518c833738668036318dc10a29
SHA51218a95cbe157801dfb306921d03d2313b421caae5756029c6a3bef5adffa3cca77e8a0a90cc2d9e4121a9d7d0d3c15d86681bccc3113725079bed637d01aebf83
-
Filesize
160B
MD5890e5f6383c26dc188af91fc06b727d3
SHA13ae037dc9c8baac8d960c84f98a8b9d7e00811d3
SHA256525de3338d7590bdfec430a0c96e87eea583794b1ace1975aa25979bbad748fd
SHA5120f77d913fb536ec7b0e768897ec977e4d3a539df9e35db81d45fc056bbb457af09b95f84de7d64f02083ed6f65604aac959812eeb92be55f29016fa16dcbab26
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2