Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 14:21
Behavioral task
behavioral1
Sample
3d658ea8d1d631607e0f947e8dd78d60N.exe
Resource
win7-20240705-en
General
-
Target
3d658ea8d1d631607e0f947e8dd78d60N.exe
-
Size
20KB
-
MD5
3d658ea8d1d631607e0f947e8dd78d60
-
SHA1
5c5ea949d1ccb802135b4926765b767892445efc
-
SHA256
f756eb7ac1830a7d6f2d6494995e483421895c125f335106b1e023c05ca602a6
-
SHA512
05236af35623c3a6f85a4740a32ab25d723d6ef8309d5709419f4b29cb350b5ebeb676a3b037b12b8586242733df61994738255c3a86bda668d655e6002b2298
-
SSDEEP
384:UCcGwJGWjzc7Vmm2IQ0wgvRcOAUZtM+LUr/afjuByAty:TcfGWaZ2IQ0NlM+6/afjuVy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2432 cnwog.exe -
Loads dropped DLL 1 IoCs
pid Process 2536 3d658ea8d1d631607e0f947e8dd78d60N.exe -
resource yara_rule behavioral1/memory/2536-0-0x0000000000130000-0x000000000013C000-memory.dmp upx behavioral1/files/0x000e000000012025-5.dat upx behavioral1/memory/2536-7-0x00000000003D0000-0x00000000003DC000-memory.dmp upx behavioral1/memory/2432-11-0x00000000000E0000-0x00000000000EC000-memory.dmp upx behavioral1/memory/2432-15-0x00000000000E0000-0x00000000000EC000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d658ea8d1d631607e0f947e8dd78d60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cnwog.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2432 2536 3d658ea8d1d631607e0f947e8dd78d60N.exe 31 PID 2536 wrote to memory of 2432 2536 3d658ea8d1d631607e0f947e8dd78d60N.exe 31 PID 2536 wrote to memory of 2432 2536 3d658ea8d1d631607e0f947e8dd78d60N.exe 31 PID 2536 wrote to memory of 2432 2536 3d658ea8d1d631607e0f947e8dd78d60N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d658ea8d1d631607e0f947e8dd78d60N.exe"C:\Users\Admin\AppData\Local\Temp\3d658ea8d1d631607e0f947e8dd78d60N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\cnwog.exe"C:\Users\Admin\AppData\Local\Temp\cnwog.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5354b94a662faba172856cbd0746833b3
SHA1341afae76bf71fefc51c6c3a0e20c6fe3cabf666
SHA256ba04910998925a6fd5cb43e17bbb78de93619fec32e11d9b4f4ca72b5ec177c9
SHA512a1de1444118189b150d30210d98b279f1c99e0f574ff3fef84e151342ebbb4261608888ba0446a5bced93004d5cc798b3b625f2a7a4ce9d790b8b92b30614bf4