Analysis
-
max time kernel
31s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 11:12
Behavioral task
behavioral1
Sample
65483353bf8c9791c9c82f8585459160N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
65483353bf8c9791c9c82f8585459160N.exe
Resource
win10v2004-20240802-en
General
-
Target
65483353bf8c9791c9c82f8585459160N.exe
-
Size
135KB
-
MD5
65483353bf8c9791c9c82f8585459160
-
SHA1
2dc8cbd14afad5cc5976fcb4053e7363be7950e7
-
SHA256
48233756b5944f436a0a9b4e245d6234dc7596b1e40ba1644fb6f035b2169a5a
-
SHA512
31a1735ac89701fa92f8713ce1d7b73e6f22130c3f9f8714050f2e870e65498431b8aab42c54965b9f017015c9893010940ea36233a76658b3c221eb423f900e
-
SSDEEP
1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SOl:YfU/WF6QMauSuiWNi9eNOl0007NZIOl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2784 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2824 wuauclt.exe -
Loads dropped DLL 1 IoCs
pid Process 2732 65483353bf8c9791c9c82f8585459160N.exe -
resource yara_rule behavioral1/memory/2732-0-0x0000000000A70000-0x0000000000A98000-memory.dmp upx behavioral1/files/0x00070000000177da-2.dat upx behavioral1/memory/2824-7-0x0000000000B90000-0x0000000000BB8000-memory.dmp upx behavioral1/memory/2732-8-0x0000000000A70000-0x0000000000A98000-memory.dmp upx behavioral1/memory/2824-10-0x0000000000B90000-0x0000000000BB8000-memory.dmp upx behavioral1/memory/2732-11-0x0000000000A70000-0x0000000000A98000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\wuauclt.exe\" /run" 65483353bf8c9791c9c82f8585459160N.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65483353bf8c9791c9c82f8585459160N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2824 2732 65483353bf8c9791c9c82f8585459160N.exe 30 PID 2732 wrote to memory of 2824 2732 65483353bf8c9791c9c82f8585459160N.exe 30 PID 2732 wrote to memory of 2824 2732 65483353bf8c9791c9c82f8585459160N.exe 30 PID 2732 wrote to memory of 2824 2732 65483353bf8c9791c9c82f8585459160N.exe 30 PID 2732 wrote to memory of 2784 2732 65483353bf8c9791c9c82f8585459160N.exe 31 PID 2732 wrote to memory of 2784 2732 65483353bf8c9791c9c82f8585459160N.exe 31 PID 2732 wrote to memory of 2784 2732 65483353bf8c9791c9c82f8585459160N.exe 31 PID 2732 wrote to memory of 2784 2732 65483353bf8c9791c9c82f8585459160N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\65483353bf8c9791c9c82f8585459160N.exe"C:\Users\Admin\AppData\Local\Temp\65483353bf8c9791c9c82f8585459160N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\ProgramData\Update\wuauclt.exe"C:\ProgramData\Update\wuauclt.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\65483353bf8c9791c9c82f8585459160N.exe" >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5facbb0c7e90e649d01a800a2a4e38ca8
SHA1fa95587e62bae0a07c071237e59f0a7005b3eff6
SHA256911817622c9239c8661f50f835994f86381a2b8bc817fa3bd8897c4cb65efddc
SHA512534b2d68c4ce2cded1d1dbaad94d9b939e4895f00255e43e8c4d5d62e3216ef112a3644d95ede5b6db187e1e4b30aefcdef0d149014f8ca5ca6a60838f70e1f2