Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 09:48
Behavioral task
behavioral1
Sample
d3c0fdc1eff7ccee3038399a717fa780N.exe
Resource
win7-20240708-en
General
-
Target
d3c0fdc1eff7ccee3038399a717fa780N.exe
-
Size
55KB
-
MD5
d3c0fdc1eff7ccee3038399a717fa780
-
SHA1
cd5445fe8c8068785eb16f6b65c040276c729f85
-
SHA256
3debcbb2058be98efbd78a54be73399f0b9b89d013ddf2ab2e48f68100e3b78d
-
SHA512
1a210dec0f1389c2654f49b56ebdf692334a6a2122a979412e8141753f1eb353f20e3a752070d37174aab91483c74e94ebae3605565a5112eed5348278b6b64f
-
SSDEEP
768:4oMn6f9zSX3e3cZ9SoD8XD33fyEpk58sCuSNcIcXR/QGQeCa57qEQwLGVPyMT18:26f9uusDSoDEXC58kSEYFa1vnLaya6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2788 upsec.exe -
Loads dropped DLL 1 IoCs
pid Process 2180 d3c0fdc1eff7ccee3038399a717fa780N.exe -
resource yara_rule behavioral1/memory/2180-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x0008000000012115-6.dat upx behavioral1/memory/2180-10-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2788-12-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2788-16-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3c0fdc1eff7ccee3038399a717fa780N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upsec.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2788 2180 d3c0fdc1eff7ccee3038399a717fa780N.exe 30 PID 2180 wrote to memory of 2788 2180 d3c0fdc1eff7ccee3038399a717fa780N.exe 30 PID 2180 wrote to memory of 2788 2180 d3c0fdc1eff7ccee3038399a717fa780N.exe 30 PID 2180 wrote to memory of 2788 2180 d3c0fdc1eff7ccee3038399a717fa780N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3c0fdc1eff7ccee3038399a717fa780N.exe"C:\Users\Admin\AppData\Local\Temp\d3c0fdc1eff7ccee3038399a717fa780N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\upsec.exe"C:\Users\Admin\AppData\Local\Temp\upsec.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5bcef60f60deb14981aa9f8fb5b8313da
SHA17afbf67f119edef70717d9db8717dbcf8d11c26c
SHA2569285bd0cb8c334e84ca7289cd4d22f37733e8ff065e72694e2e8efa641d1c41f
SHA512c563bee3ade7d69ad9602f7e416c3e36b647241cfaf6653c287c1cb08a403d7e8455218c00c0fc8a8095cb38ed44748112d6e817c60d6ecee17ba799329c9c3f