Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 18:20
Behavioral task
behavioral1
Sample
beb3deaaaf74b0db0abbf28bbc90bba0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
beb3deaaaf74b0db0abbf28bbc90bba0N.exe
Resource
win10v2004-20240802-en
General
-
Target
beb3deaaaf74b0db0abbf28bbc90bba0N.exe
-
Size
41KB
-
MD5
beb3deaaaf74b0db0abbf28bbc90bba0
-
SHA1
8355cf5f2f6924b47a90df21ce2e56c8144e7e90
-
SHA256
a59cbf2b9f778a9060ea0df6f07ad2b405d19d33b54e2b7347d083f347156ea6
-
SHA512
69cb431a993c8d6e8362fdbefdcebc478972b76135eef4033cd886c766aebbb47bf182cbe17fc6c401a3a777fd3df79d921e2a986d6f73b4741869a1551494f4
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3372 services.exe -
resource yara_rule behavioral2/memory/2368-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x0008000000023420-6.dat upx behavioral2/memory/3372-7-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2368-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3372-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3372-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3372-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3372-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3372-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3372-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3372-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3372-43-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2368-47-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3372-48-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0006000000016938-61.dat upx behavioral2/memory/2368-125-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3372-126-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2368-174-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3372-175-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" beb3deaaaf74b0db0abbf28bbc90bba0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe beb3deaaaf74b0db0abbf28bbc90bba0N.exe File opened for modification C:\Windows\java.exe beb3deaaaf74b0db0abbf28bbc90bba0N.exe File created C:\Windows\java.exe beb3deaaaf74b0db0abbf28bbc90bba0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beb3deaaaf74b0db0abbf28bbc90bba0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2368 wrote to memory of 3372 2368 beb3deaaaf74b0db0abbf28bbc90bba0N.exe 84 PID 2368 wrote to memory of 3372 2368 beb3deaaaf74b0db0abbf28bbc90bba0N.exe 84 PID 2368 wrote to memory of 3372 2368 beb3deaaaf74b0db0abbf28bbc90bba0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\beb3deaaaf74b0db0abbf28bbc90bba0N.exe"C:\Users\Admin\AppData\Local\Temp\beb3deaaaf74b0db0abbf28bbc90bba0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
41KB
MD5878a584d89cf8fe185a93ff1077fab2b
SHA182fa835deb4695ba27f3d7cc791f4b7865745320
SHA256d23f9778506a0039243d0c8db55fb3d211207e741373ba7b10f5ef0a327d097b
SHA512ad04960aa36e2e3449e5ba57eca95f5e30e7e95eaf193e03988899fe6b0f88e56fe23bf5c1681b548fda3292162f798b88a96e933953726293acf6fc4ec3d4e9
-
Filesize
160B
MD53d8cf1d609f09d900ce3559779874d3e
SHA1bdec9184f3e716da793c2fbb3b582cd27a51393e
SHA256225593f7e4208628fd40b112631919fff9d49b0808e595e34e4eb039f172db7c
SHA51296602185ac006467bf0f1c8e33f4f8ec323c3d80c6a7f8ae94421c996e61263cb76f1e1cb9beeeb0e38e0270e943b566062eb361bdb229c863a1cc0d685db1be
-
Filesize
160B
MD5608423b967bb282f62ff8f9bb3d7138b
SHA16386c1fe90688737e2d26fe717dfdefe1e87e00b
SHA256839d8e54b64314b9438ca02fbb1fb0aec438cee75f0c6d504c8956478a3b5c1c
SHA5127dd4f21b1833ffc282a7bf6f1dd08846f8d4ef56c8020c23a1d8c95b9ed3532225824e02c3e1d7040c9c919172f5c6616a2d365daa9390e47bb87be75b2ae343
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2