Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 16:08
Behavioral task
behavioral1
Sample
4a444468034001bf24dbced79c60ee40N.exe
Resource
win7-20240708-en
General
-
Target
4a444468034001bf24dbced79c60ee40N.exe
-
Size
611KB
-
MD5
4a444468034001bf24dbced79c60ee40
-
SHA1
0d80b7a085068b8f9224f1d6f1e3e9d74ba1ae18
-
SHA256
3d1da79f981694da75e7435a4577381233434592dab00a872d787533e1d42a4f
-
SHA512
425daf78d9957ef7187725a9a14179971315ea874c3564b019328dfd02f4b60190e7940519586422e5ab8cdc55d6c3aa8ebd3dfb64fbbbb582b6242af7940f4a
-
SSDEEP
12288:IBAsu/1OsCzbT7YebtN2rMFpouF0/DD0:ZMzEgNPFpoz/0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1972 reporting.exe -
Loads dropped DLL 2 IoCs
pid Process 2404 4a444468034001bf24dbced79c60ee40N.exe 2404 4a444468034001bf24dbced79c60ee40N.exe -
resource yara_rule behavioral1/memory/2404-0-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral1/files/0x0007000000016cd7-7.dat upx behavioral1/memory/1972-10-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral1/memory/2404-11-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral1/memory/1972-12-0x0000000000400000-0x0000000000581000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\progress\reporting.exe 4a444468034001bf24dbced79c60ee40N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a444468034001bf24dbced79c60ee40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reporting.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2404 4a444468034001bf24dbced79c60ee40N.exe 2404 4a444468034001bf24dbced79c60ee40N.exe 2404 4a444468034001bf24dbced79c60ee40N.exe 2404 4a444468034001bf24dbced79c60ee40N.exe 1972 reporting.exe 1972 reporting.exe 1972 reporting.exe 1972 reporting.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1972 2404 4a444468034001bf24dbced79c60ee40N.exe 31 PID 2404 wrote to memory of 1972 2404 4a444468034001bf24dbced79c60ee40N.exe 31 PID 2404 wrote to memory of 1972 2404 4a444468034001bf24dbced79c60ee40N.exe 31 PID 2404 wrote to memory of 1972 2404 4a444468034001bf24dbced79c60ee40N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a444468034001bf24dbced79c60ee40N.exe"C:\Users\Admin\AppData\Local\Temp\4a444468034001bf24dbced79c60ee40N.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files\progress\reporting.exe"C:\Program Files\progress\reporting.exe" "33201"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
611KB
MD54663f74160f3211ffa2bb2f40fab73dd
SHA17aeb773708a86619ba5e3d4fed6c674c2a822174
SHA25671003561f9b6ca507e6044f765a6bc25284094d7dad817c1066d065600525cc2
SHA512a4dc2ca70add3b38cba641bcd06b9fc333295a190791bfebf283da51689fd6e86cde74b82d390fa087761fe39339eff3e14672bd8490711210f874ee0e5eb488