Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
CV.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
CV.exe
Resource
win10v2004-20240802-en
General
-
Target
CV.exe
-
Size
1.2MB
-
MD5
936f713a0ded9243355db3cb17a0471e
-
SHA1
11e9cf6facdb4b026dc750430ae62c9f8d6b4d36
-
SHA256
dd062485ab10c62ace9325bd549f32d4dbf8cdfa0326c83d43a02202857e0d33
-
SHA512
8330bfc21ca9b3d63db60fb6d0fe203d37b6a1787fbb23fdaa3319a1c6e6e318a73ddec0374562cb36a229a17886665d488edc6dd8f50429bdd101770f7a7ba7
-
SSDEEP
24576:fqDEvCTbMWu7rQYlBQcBiT6rprG8aXaWzj52utKVpwKcJl04U:fTvC/MTQYxsWR7aXfjt0VpM/
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 3064 name.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0003000000022aa5-16.dat autoit_exe behavioral2/memory/3064-33-0x0000000000DA0000-0x0000000000EE2000-memory.dmp autoit_exe behavioral2/memory/3064-37-0x0000000000DA0000-0x0000000000EE2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3064 set thread context of 1348 3064 name.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3064 name.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4876 CV.exe 4876 CV.exe 3064 name.exe 3064 name.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 4876 CV.exe 4876 CV.exe 3064 name.exe 3064 name.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4876 wrote to memory of 3064 4876 CV.exe 87 PID 4876 wrote to memory of 3064 4876 CV.exe 87 PID 4876 wrote to memory of 3064 4876 CV.exe 87 PID 3064 wrote to memory of 1348 3064 name.exe 88 PID 3064 wrote to memory of 1348 3064 name.exe 88 PID 3064 wrote to memory of 1348 3064 name.exe 88 PID 3064 wrote to memory of 1348 3064 name.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\CV.exe"C:\Users\Admin\AppData\Local\Temp\CV.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\CV.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\CV.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5f63ccabfe159775635d5a77e1fc635c0
SHA13907cc1f1a567629134fa44a001aea4e2b9bedb1
SHA2567bc85b7f72f9a3c9b650d65106fcccc58c680a30da4a98de51cf0b282424b794
SHA5124a109624b4a70b548dbfd2d4afbb48040af9e033f3dd167f7ddbfd46ce44033976f1119976a94f60af6fbcf265a3881ce96f5aee62324ecc12ec13e722dc9e8e
-
Filesize
84KB
MD53733b47a742fed2e4065551f5d89b3bd
SHA11683eb1918e9c792668dc9b4ed65cad98c8a06cd
SHA256889d8d51d9984a888d5d6535450a91319105222d4b341c2c6ca21ce0ad34c758
SHA51232ce91dcc9448def6848d6e1f72b63907d5c5009303892297be533d8439163629e8eb60fe4a6c9d217ee0af70469c947353aa194a73b5e49e1d397e7e5789b76
-
Filesize
1.2MB
MD5936f713a0ded9243355db3cb17a0471e
SHA111e9cf6facdb4b026dc750430ae62c9f8d6b4d36
SHA256dd062485ab10c62ace9325bd549f32d4dbf8cdfa0326c83d43a02202857e0d33
SHA5128330bfc21ca9b3d63db60fb6d0fe203d37b6a1787fbb23fdaa3319a1c6e6e318a73ddec0374562cb36a229a17886665d488edc6dd8f50429bdd101770f7a7ba7