Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
2e35b03ce43d0c162f1823017fb9d890N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2e35b03ce43d0c162f1823017fb9d890N.exe
Resource
win10v2004-20240802-en
General
-
Target
2e35b03ce43d0c162f1823017fb9d890N.exe
-
Size
146KB
-
MD5
2e35b03ce43d0c162f1823017fb9d890
-
SHA1
b3fe52204e068f81cf002b95673b77850b43f493
-
SHA256
3b47e325a8b07d1f0fc654f353703c3ae90278b595e7e6416ae081489c4b9f88
-
SHA512
c85cdd949488efd9a00a3b604d803cf3e9d1e2cb22394c71131419d0e7d3c854a610043183e12b8feddb11242653c84a26a9a36bcbd2e1bc41b2eaedcd0d2033
-
SSDEEP
3072:ABAp5XhKpN4eOyVTGfhEClj8jTk+0hnTm52X+q9ln:3bXE9OiTGfhEClq9gKZq/n
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 1084 WScript.exe 7 1084 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 7 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Com\New1\a1111.dfg 2e35b03ce43d0c162f1823017fb9d890N.exe File opened for modification C:\Program Files (x86)\Com\New1\s1111f.dfd 2e35b03ce43d0c162f1823017fb9d890N.exe File opened for modification C:\Program Files (x86)\Com\New1\Uninstall.exe 2e35b03ce43d0c162f1823017fb9d890N.exe File created C:\Program Files (x86)\Com\New1\Uninstall.ini 2e35b03ce43d0c162f1823017fb9d890N.exe File opened for modification C:\Program Files (x86)\Com\New1\tansi_minuss.bat 2e35b03ce43d0c162f1823017fb9d890N.exe File opened for modification C:\Program Files (x86)\Com\New1\rg11333i.vbs 2e35b03ce43d0c162f1823017fb9d890N.exe File opened for modification C:\Program Files (x86)\Com\New1\tu33444i.vbs 2e35b03ce43d0c162f1823017fb9d890N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e35b03ce43d0c162f1823017fb9d890N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 572 wrote to memory of 2704 572 2e35b03ce43d0c162f1823017fb9d890N.exe 30 PID 572 wrote to memory of 2704 572 2e35b03ce43d0c162f1823017fb9d890N.exe 30 PID 572 wrote to memory of 2704 572 2e35b03ce43d0c162f1823017fb9d890N.exe 30 PID 572 wrote to memory of 2704 572 2e35b03ce43d0c162f1823017fb9d890N.exe 30 PID 2704 wrote to memory of 2924 2704 cmd.exe 32 PID 2704 wrote to memory of 2924 2704 cmd.exe 32 PID 2704 wrote to memory of 2924 2704 cmd.exe 32 PID 2704 wrote to memory of 2924 2704 cmd.exe 32 PID 2704 wrote to memory of 1084 2704 cmd.exe 33 PID 2704 wrote to memory of 1084 2704 cmd.exe 33 PID 2704 wrote to memory of 1084 2704 cmd.exe 33 PID 2704 wrote to memory of 1084 2704 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e35b03ce43d0c162f1823017fb9d890N.exe"C:\Users\Admin\AppData\Local\Temp\2e35b03ce43d0c162f1823017fb9d890N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\Com\New1\tansi_minuss.bat" "2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Com\New1\rg11333i.vbs"3⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Com\New1\tu33444i.vbs"3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1084
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
909B
MD590e4c6e8c59ccba248ce3e76039a3918
SHA1050d1d3268d4e3dd09dd37bcfb653a9e25b4d69c
SHA2562c6271e4f943f118fc24e2016e3bb3d32f8da2cb041005e6d1a2ec1fd48eb161
SHA512474a826aa64b09109572dc007ff7d377570055a12152a677b72180c846c3d9cbf388e876e6833012c6726ff359379aeada2df0d483e88e020703689067aa2e17
-
Filesize
37B
MD5246f4a66337880c8a04b7f1bb7170d17
SHA1313993f01c080c16bf1bd217e3628b122bd12c21
SHA25696391bffd06a3fe72738561868d41deb85ffae9d0ac50f42403ddf485e3707b3
SHA5120f0ec4c759fb2df384e1cbc06ffd1695ed8c46dbbf987389d7647ef511bf9a291129d3a4dc32aecbcaf0690ce9b67708a9cffd6b525bf50824a3041d40c96fe4
-
Filesize
1KB
MD55bc734cdff6afd0f122bec204e73f30a
SHA1b74a05237f0ad979ce8a7918f83490a6dd10164e
SHA256949b45692b733e06d06f07877bccace84e41bb59eb5776a884ad1f3def9a39d9
SHA5124dfa24f1678fab25f8e3111f3f00f31137fbeeb51bd871af0c928dce3bf8a99d81334fee76cce61e7ede4c00de29c91d3db5e47e8cf3a7c25fd4342d71c74f64
-
Filesize
212B
MD541e0643e1afa912bae8e2e6c5c2ce5d7
SHA1cc3a2ad3426194e4f97cb668068401fc89ca466d
SHA25667a56c7874b67a25915426988e5ba5c2f89783c6ee6bf1a4f06a6eab1b4355f1
SHA512db06752452a2b303ddd0372c5395c34208191143c9cf664426211099a6ecb5d5f8541c2b526b67d0ca41d79c3df5463574201aa0a62d5cf6819287da89156118
-
Filesize
1KB
MD596e91b3cb2d6d44ee2a373765f0f400a
SHA1d1248715883b5f0b7310dbbeb16cb631e069e952
SHA256eb371728896f4746eff26836e27a15675927f8b380a0c27db6772672e3b69707
SHA5122c82e90885f5123bcde77d17f2d209ae3a806f60692a8a0a5a68136fe7c9dfc94e2abf944e023e79a4cd72b0b54e0d594fe5ddf207346b944863e402fbc19457