Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 07:17
Static task
static1
Behavioral task
behavioral1
Sample
Label_Copy_UPS.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Label_Copy_UPS.exe
Resource
win10v2004-20240802-en
General
-
Target
Label_Copy_UPS.exe
-
Size
88KB
-
MD5
22ae06e29376b1be53de2a509d734925
-
SHA1
6d3ba7c802926d9643eac5fca727c4dd92cf6776
-
SHA256
58a713b8201a97ce6e7fb1f0ede65b3d746de0d4bb370247e11b5a4ad34dfe6b
-
SHA512
b61b59a45d380576258f5ecde4500502a3cf254c9bfeeaf005fea16ba912b237d2f42cb7d645b6b8c5497e88154e57b1ff24047601d2db163fb3283b31df78ec
-
SSDEEP
1536:70qCO2BhXCTswe9phgDB8Zk1a5oc0smGsGVI/Xj/x+DtYBLYabbnS5Es/rmty:7T2PC0u1ooc0kwl+DG1xH8El
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2368 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2640 set thread context of 2516 2640 Label_Copy_UPS.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Label_Copy_UPS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Label_Copy_UPS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 852 NOTEPAD.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2516 Label_Copy_UPS.exe 2516 Label_Copy_UPS.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2516 2640 Label_Copy_UPS.exe 31 PID 2640 wrote to memory of 2516 2640 Label_Copy_UPS.exe 31 PID 2640 wrote to memory of 2516 2640 Label_Copy_UPS.exe 31 PID 2640 wrote to memory of 2516 2640 Label_Copy_UPS.exe 31 PID 2640 wrote to memory of 2516 2640 Label_Copy_UPS.exe 31 PID 2640 wrote to memory of 2516 2640 Label_Copy_UPS.exe 31 PID 2640 wrote to memory of 2516 2640 Label_Copy_UPS.exe 31 PID 2640 wrote to memory of 2516 2640 Label_Copy_UPS.exe 31 PID 2640 wrote to memory of 2516 2640 Label_Copy_UPS.exe 31 PID 2516 wrote to memory of 2368 2516 Label_Copy_UPS.exe 32 PID 2516 wrote to memory of 2368 2516 Label_Copy_UPS.exe 32 PID 2516 wrote to memory of 2368 2516 Label_Copy_UPS.exe 32 PID 2516 wrote to memory of 2368 2516 Label_Copy_UPS.exe 32 PID 2368 wrote to memory of 852 2368 svchost.exe 33 PID 2368 wrote to memory of 852 2368 svchost.exe 33 PID 2368 wrote to memory of 852 2368 svchost.exe 33 PID 2368 wrote to memory of 852 2368 svchost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Label_Copy_UPS.exe"C:\Users\Admin\AppData\Local\Temp\Label_Copy_UPS.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Label_Copy_UPS.exeC:\Users\Admin\AppData\Local\Temp\Label_Copy_UPS.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Label_Copy_UPS.txt4⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:852
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD543fb2705d9766ea761f934981936503f
SHA1c9589c81355baab345cd121a76dcd743d65e131c
SHA256766a90366e6cac315d05afc9c97dcd6206a7f66da260dd41d209bb6ad13947e0
SHA512ebf82587e4a8dad580b0c6c6959c73315c584cea82c41c073aab41854a44027fbc63d3f360651e726bfe71bc9e99a1b803574715e63d462f90182291ce3dfbf4