Analysis
-
max time kernel
120s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 01:04
Behavioral task
behavioral1
Sample
a7b93c40d2e5bb1b02de6e5cf18b0950N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a7b93c40d2e5bb1b02de6e5cf18b0950N.exe
Resource
win10v2004-20240802-en
General
-
Target
a7b93c40d2e5bb1b02de6e5cf18b0950N.exe
-
Size
29KB
-
MD5
a7b93c40d2e5bb1b02de6e5cf18b0950
-
SHA1
6638b2b683533ecc639023f6eabf3b1b363f4c1c
-
SHA256
9f5a8715a1ca6d82dac4457b0e6d2bbfe5f1f1133a97564d19e9ea189fa880d2
-
SHA512
6daeb12e3d8ed13d4c458bf341810ddc395105bfde071acd18ed6ab304f14fae628a60807f60a373fb5b571c8cf5fd4410f8e60ec1cd985ba05eebd4abe66c10
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/w:AEwVs+0jNDY1qi/qI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1276 services.exe -
resource yara_rule behavioral1/memory/1928-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1928-4-0x0000000000220000-0x0000000000228000-memory.dmp upx behavioral1/files/0x0008000000016d37-7.dat upx behavioral1/memory/1928-15-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1276-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1276-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1276-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1276-29-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1276-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1276-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1276-41-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1928-42-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1276-43-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1928-47-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1276-48-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0029000000016d0a-58.dat upx behavioral1/memory/1928-65-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1276-66-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1928-67-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1276-68-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1928-72-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1276-73-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" a7b93c40d2e5bb1b02de6e5cf18b0950N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe a7b93c40d2e5bb1b02de6e5cf18b0950N.exe File opened for modification C:\Windows\java.exe a7b93c40d2e5bb1b02de6e5cf18b0950N.exe File created C:\Windows\java.exe a7b93c40d2e5bb1b02de6e5cf18b0950N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7b93c40d2e5bb1b02de6e5cf18b0950N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1276 1928 a7b93c40d2e5bb1b02de6e5cf18b0950N.exe 30 PID 1928 wrote to memory of 1276 1928 a7b93c40d2e5bb1b02de6e5cf18b0950N.exe 30 PID 1928 wrote to memory of 1276 1928 a7b93c40d2e5bb1b02de6e5cf18b0950N.exe 30 PID 1928 wrote to memory of 1276 1928 a7b93c40d2e5bb1b02de6e5cf18b0950N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7b93c40d2e5bb1b02de6e5cf18b0950N.exe"C:\Users\Admin\AppData\Local\Temp\a7b93c40d2e5bb1b02de6e5cf18b0950N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5ef8e438586c56607310d93d7b694a0a3
SHA18bbb09927ff6f13dd7cacaea976fd360eb39f5fc
SHA2562987b02b6c3a2425ebe6e90ed42212417ad9fb5809fba577d7a60020e565aa34
SHA5126bde01e6e18e71c16c2d638f0d7bec87dd529e1ba77e593bd8202af86ccb88956a2c184ead100815268a31e30b4302466e98c6ded3a5cbbb3f1b15d04dc74cb2
-
Filesize
352B
MD5cd0888cf18decb996d1ecedf81cde50a
SHA165b988d506140c46c4439d8f9fb5ff2fb6083a90
SHA2565bc9bb55ecd51b876a8d21f2ed484ee16f42cef73febd52492468ad48a687619
SHA512216baaea601a1f48ab3cebba9cd3debb0532af4d80e2da574711818f3de4d1539d8e6a25fbc8986002aff323c5febf222064ac3e07b3c417d8248e24aa486064
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2