Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
fccf6aa6b4e66d16bf41ac4af93d30a493e7c1e92ec4705eac0f835d4b3989b1.exe
Resource
win7-20240704-en
General
-
Target
fccf6aa6b4e66d16bf41ac4af93d30a493e7c1e92ec4705eac0f835d4b3989b1.exe
-
Size
7.2MB
-
MD5
15a17aeeda7bbc34fbdd1776eba28c9d
-
SHA1
11a6cec3404f7a7bed14f0ee38a4c3c4605703c3
-
SHA256
fccf6aa6b4e66d16bf41ac4af93d30a493e7c1e92ec4705eac0f835d4b3989b1
-
SHA512
9af7bdefa8c9c073831283f188bfaa2a3f7c8e7856983e09eb6c0752945b99790f563e1230193a9b253703808fda3c4b0510a5b05b8980b0c1f22d8bae09ebe0
-
SSDEEP
49152:wsfU4xVKdLxE/lB/fOROMbIGXYHn8jaLaM8nRF7BcnLUsXPRTFwCDTQnor2HMnfB:9xVKdLxA/fYDbIGGn8jaLLPwrynrw2
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1716 fccf6aa6b4e66d16bf41ac4af93d30a493e7c1e92ec4705eac0f835d4b3989b1.exe -
resource yara_rule behavioral1/memory/1716-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1716-130-0x0000000010000000-0x000000001003E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fccf6aa6b4e66d16bf41ac4af93d30a493e7c1e92ec4705eac0f835d4b3989b1.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1716 fccf6aa6b4e66d16bf41ac4af93d30a493e7c1e92ec4705eac0f835d4b3989b1.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1716 fccf6aa6b4e66d16bf41ac4af93d30a493e7c1e92ec4705eac0f835d4b3989b1.exe 1716 fccf6aa6b4e66d16bf41ac4af93d30a493e7c1e92ec4705eac0f835d4b3989b1.exe 1716 fccf6aa6b4e66d16bf41ac4af93d30a493e7c1e92ec4705eac0f835d4b3989b1.exe 1716 fccf6aa6b4e66d16bf41ac4af93d30a493e7c1e92ec4705eac0f835d4b3989b1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fccf6aa6b4e66d16bf41ac4af93d30a493e7c1e92ec4705eac0f835d4b3989b1.exe"C:\Users\Admin\AppData\Local\Temp\fccf6aa6b4e66d16bf41ac4af93d30a493e7c1e92ec4705eac0f835d4b3989b1.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD52997637ca34285e3f7945ffc4fd734b5
SHA1a1ca318f902785de9ba025a6b361fc53537416da
SHA2561ce7fcf5655a2e214204d3aaad69a9f87c7fc98b4b0164ef360d29d4f85212b4
SHA512562489694636c0af446613c8a2a5126b66619b22143842f05a12cb479c2d8d9b1cf68ae1d4a5053222388a30bb48742fdbbafe8732aa28babf73cec8708502c5
-
Filesize
728KB
MD5006d175e480403666095f4077a7b4260
SHA18a13d09ab170fd3e04edba33c16f6a91d91fce82
SHA2560af365b5db119b2f43d72cb75f3f0302bbaa3a05ef61ef71c256c231713be5dd
SHA5125a31a7a8e147752982075b76c6e64edec28c245255f8f0cf3d1ad76436619a32b448c19194a4e74bed92fb1f65da59dbc8383e004755d42830fc68de63b702c6