Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 21:43
Static task
static1
Behavioral task
behavioral1
Sample
20628e9a792a65fcf80079aff96ec0e0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
20628e9a792a65fcf80079aff96ec0e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
20628e9a792a65fcf80079aff96ec0e0N.exe
-
Size
4.9MB
-
MD5
20628e9a792a65fcf80079aff96ec0e0
-
SHA1
ed0c7d704e767354615748ef958b84f070d3ca8d
-
SHA256
9a9d319b7e493f58e77a693d2a78737667962fe2d7023798ad0a7cce8e6e473e
-
SHA512
689f39e38ed162ddeba0fa4ec39d033c1d76896b78fc8ae5a2f3c517306e2f2531bdc765fd7768d9f5ca08682f12d67870558c004969f2daf85b06829555f2f3
-
SSDEEP
49152:WbF+ZpLwn4PGaUFC6Ymr2c78S1/mPXlxQ7jkGtpF5tLVPElqX0RFCfBQK3kEdToN:WbF+HwnrC63r2f+r+I/431vGy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2408 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 20628e9a792a65fcf80079aff96ec0e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 20628e9a792a65fcf80079aff96ec0e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 20628e9a792a65fcf80079aff96ec0e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20628e9a792a65fcf80079aff96ec0e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSWDM.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2408 2372 20628e9a792a65fcf80079aff96ec0e0N.exe 30 PID 2372 wrote to memory of 2408 2372 20628e9a792a65fcf80079aff96ec0e0N.exe 30 PID 2372 wrote to memory of 2408 2372 20628e9a792a65fcf80079aff96ec0e0N.exe 30 PID 2372 wrote to memory of 2408 2372 20628e9a792a65fcf80079aff96ec0e0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\20628e9a792a65fcf80079aff96ec0e0N.exe"C:\Users\Admin\AppData\Local\Temp\20628e9a792a65fcf80079aff96ec0e0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD520628e9a792a65fcf80079aff96ec0e0
SHA1ed0c7d704e767354615748ef958b84f070d3ca8d
SHA2569a9d319b7e493f58e77a693d2a78737667962fe2d7023798ad0a7cce8e6e473e
SHA512689f39e38ed162ddeba0fa4ec39d033c1d76896b78fc8ae5a2f3c517306e2f2531bdc765fd7768d9f5ca08682f12d67870558c004969f2daf85b06829555f2f3