Analysis
-
max time kernel
101s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 05:35
Static task
static1
Behavioral task
behavioral1
Sample
412e4ceffd1b225d59d8fa2f61e5ac40N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
412e4ceffd1b225d59d8fa2f61e5ac40N.exe
Resource
win10v2004-20240802-en
General
-
Target
412e4ceffd1b225d59d8fa2f61e5ac40N.exe
-
Size
37KB
-
MD5
412e4ceffd1b225d59d8fa2f61e5ac40
-
SHA1
11c5195d2ec812303f9d03d040e309ef6fdc5a78
-
SHA256
bafb959703cc5ea34264d3aa4a7b372f5064348a0200326f9f1d8806822b1001
-
SHA512
135db367bfa0c7536214cc13fa748ddd27999a131266fd64c64040f6c47190a2edaa580494c5afbfe5abf4916642a34e6b3472f9095d5106867d49e2499c7161
-
SSDEEP
384:cIZAvJmRPDN/jSyC8MxVLzFXME7dgPWlL1lQRs4bIoJu/QXl29bha:hAvJ4LSyC8aVN7X4bIos/ul23a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2412 comhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2536 412e4ceffd1b225d59d8fa2f61e5ac40N.exe 2536 412e4ceffd1b225d59d8fa2f61e5ac40N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 412e4ceffd1b225d59d8fa2f61e5ac40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language comhost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2412 2536 412e4ceffd1b225d59d8fa2f61e5ac40N.exe 30 PID 2536 wrote to memory of 2412 2536 412e4ceffd1b225d59d8fa2f61e5ac40N.exe 30 PID 2536 wrote to memory of 2412 2536 412e4ceffd1b225d59d8fa2f61e5ac40N.exe 30 PID 2536 wrote to memory of 2412 2536 412e4ceffd1b225d59d8fa2f61e5ac40N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\412e4ceffd1b225d59d8fa2f61e5ac40N.exe"C:\Users\Admin\AppData\Local\Temp\412e4ceffd1b225d59d8fa2f61e5ac40N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\comhost.exe"C:\Users\Admin\AppData\Local\Temp\comhost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5bd3dbe0cba44a9a00ca8f4273df6b59a
SHA14e4db482320a520ef5c54c747f853aaa3241b2df
SHA25636f2f070d99a0100f5d952d44a51ae2f1e2042d7fa6fefd0481324011497e527
SHA51286e9b73f40cc53d8e0db41ecda30edf6aaded2889ff13d69885dbde6e5ef515832537315db400dc66ba77276df2d02589568ce1f156732bf5f55a1364ff94d58