Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 02:21
Behavioral task
behavioral1
Sample
cda4f17dc5842ff1130d56d64f567f30N.exe
Resource
win7-20240704-en
General
-
Target
cda4f17dc5842ff1130d56d64f567f30N.exe
-
Size
152KB
-
MD5
cda4f17dc5842ff1130d56d64f567f30
-
SHA1
0c2040e62950bc9eeb68f7afb8388855e8a77d2b
-
SHA256
b3af67e40fe979a3be7f1813e30792ab60c48b63ff64413e63da7eb609824bb8
-
SHA512
fd5654e673b9baad2db1d6c8867871379d94c153e6c351b6c204dfb65f712a7e97d40a252ee8fdad7acf1f0a7b3ff50211fdcb97fb771af5ade38c1c29f848fc
-
SSDEEP
1536:rGYDPjecpE1gegznLU1V+FkOzvZoAUp8aHk+EfesrSd7IfHSp3D8DxNE1lMBV6ys:CCPjecmaxiViUp80s+sfHUzO0MBV6rH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2272 navu32.exe -
Executes dropped EXE 2 IoCs
pid Process 2272 navu32.exe 1908 navu32.exe -
Loads dropped DLL 2 IoCs
pid Process 1628 cda4f17dc5842ff1130d56d64f567f30N.exe 1628 cda4f17dc5842ff1130d56d64f567f30N.exe -
resource yara_rule behavioral1/memory/1628-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000016c1f-5.dat upx behavioral1/files/0x0009000000016c1f-11.dat upx behavioral1/memory/2272-18-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1628-20-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2272-21-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1908-22-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\navu32.exe cda4f17dc5842ff1130d56d64f567f30N.exe File created C:\Windows\SysWOW64\navu32.exe cda4f17dc5842ff1130d56d64f567f30N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cda4f17dc5842ff1130d56d64f567f30N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1908 navu32.exe 1908 navu32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1908 navu32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2272 1628 cda4f17dc5842ff1130d56d64f567f30N.exe 30 PID 1628 wrote to memory of 2272 1628 cda4f17dc5842ff1130d56d64f567f30N.exe 30 PID 1628 wrote to memory of 2272 1628 cda4f17dc5842ff1130d56d64f567f30N.exe 30 PID 1628 wrote to memory of 2272 1628 cda4f17dc5842ff1130d56d64f567f30N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cda4f17dc5842ff1130d56d64f567f30N.exe"C:\Users\Admin\AppData\Local\Temp\cda4f17dc5842ff1130d56d64f567f30N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\navu32.exeC:\Windows\system32\navu32.exe -d "C:\Users\Admin\AppData\Local\Temp\cda4f17dc5842ff1130d56d64f567f30N.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2272
-
-
C:\Windows\SysWOW64\navu32.exeC:\Windows\SysWOW64\navu32.exe -v1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5cda4f17dc5842ff1130d56d64f567f30
SHA10c2040e62950bc9eeb68f7afb8388855e8a77d2b
SHA256b3af67e40fe979a3be7f1813e30792ab60c48b63ff64413e63da7eb609824bb8
SHA512fd5654e673b9baad2db1d6c8867871379d94c153e6c351b6c204dfb65f712a7e97d40a252ee8fdad7acf1f0a7b3ff50211fdcb97fb771af5ade38c1c29f848fc
-
Filesize
152KB
MD586679d423a1325b521ef47c60f77b841
SHA1ac52d8987369a5a95c12acda4eaf43d7349aae0b
SHA2566463e7f0ca1ecd77eff68f8ae0b0aade9364e59e24bc5d4fc1d5d0695020fc71
SHA51292fc21689b48ea02c50ac25afaac316512c91851286c50e2ac256434ad3178f05810d23d89704cbb53da61f3645e2bdca322af916bab94a4025994159b1e100f