Resubmissions
15-08-2024 11:42
240815-nt6pgsvcmj 715-08-2024 11:37
240815-nrkz1avbpj 1015-08-2024 11:36
240815-nqyjpsvbmq 1015-08-2024 11:33
240815-npbcsavbjm 10Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-08-2024 11:42
Static task
static1
Behavioral task
behavioral1
Sample
ae1265e9fe0ac39bbe970a3fa66c64b0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ae1265e9fe0ac39bbe970a3fa66c64b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
ae1265e9fe0ac39bbe970a3fa66c64b0N.exe
-
Size
282KB
-
MD5
ae1265e9fe0ac39bbe970a3fa66c64b0
-
SHA1
9239a5d795a2d97e72e7bd9b48b125d0e2459960
-
SHA256
87a574cbf6233e2fd7a3872da22451ae49f6248cca5c900dab49207e0f0135b0
-
SHA512
ff66d820fd16cc06ee99b995b1de7aa22d545da35518a1b02c5d5dee6a2d6c8670d3c3ba6934c0f0ebeaadb577c9de91dd9db8f8b27d1636f4f7514a6b4430a5
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfQ:boSeGUA5YZazpXUmZhZ6Sp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2732 a1punf5t2of.exe -
Loads dropped DLL 2 IoCs
pid Process 3048 ae1265e9fe0ac39bbe970a3fa66c64b0N.exe 2732 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" ae1265e9fe0ac39bbe970a3fa66c64b0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae1265e9fe0ac39bbe970a3fa66c64b0N.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2732 3048 ae1265e9fe0ac39bbe970a3fa66c64b0N.exe 31 PID 3048 wrote to memory of 2732 3048 ae1265e9fe0ac39bbe970a3fa66c64b0N.exe 31 PID 3048 wrote to memory of 2732 3048 ae1265e9fe0ac39bbe970a3fa66c64b0N.exe 31 PID 3048 wrote to memory of 2732 3048 ae1265e9fe0ac39bbe970a3fa66c64b0N.exe 31 PID 3048 wrote to memory of 2732 3048 ae1265e9fe0ac39bbe970a3fa66c64b0N.exe 31 PID 3048 wrote to memory of 2732 3048 ae1265e9fe0ac39bbe970a3fa66c64b0N.exe 31 PID 3048 wrote to memory of 2732 3048 ae1265e9fe0ac39bbe970a3fa66c64b0N.exe 31 PID 2732 wrote to memory of 1720 2732 a1punf5t2of.exe 32 PID 2732 wrote to memory of 1720 2732 a1punf5t2of.exe 32 PID 2732 wrote to memory of 1720 2732 a1punf5t2of.exe 32 PID 2732 wrote to memory of 1720 2732 a1punf5t2of.exe 32 PID 2732 wrote to memory of 1720 2732 a1punf5t2of.exe 32 PID 2732 wrote to memory of 1720 2732 a1punf5t2of.exe 32 PID 2732 wrote to memory of 1720 2732 a1punf5t2of.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae1265e9fe0ac39bbe970a3fa66c64b0N.exe"C:\Users\Admin\AppData\Local\Temp\ae1265e9fe0ac39bbe970a3fa66c64b0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:1720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD522e8c06e01b31126727ba314925c4a1d
SHA1f6481f9747ede22c8a6e4cd3a8f91194597a11a7
SHA2561f62f61807fc9d06a1241ee94a08d13ea42049db04dc908073c4f24a41d15aba
SHA512ab2d047158e7ee7c5fff23de63d595e3c8edc51b4b1e1f63a6004d541e17bd769c7fa2251bc9de4400b76376191dd87b7831f8ca2d3fc68c56243b4b44d54ea4