Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
2840c8fa8a4e14faf99976fc8dcfb770N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2840c8fa8a4e14faf99976fc8dcfb770N.exe
Resource
win10v2004-20240802-en
General
-
Target
2840c8fa8a4e14faf99976fc8dcfb770N.exe
-
Size
32KB
-
MD5
2840c8fa8a4e14faf99976fc8dcfb770
-
SHA1
0ea88c77da44462efc157c8a524bb3ce6b37879c
-
SHA256
b170f80f04e9eb364f7f0a33a9e95de4bb4f27cca155e31eadf21ed9e2ddb246
-
SHA512
16c8ea5ef93d5336fb479580625eede25ff2c02d23d3286ed421dce6749c0f65d0fc9fc965496fa0f68d0a1635226f5a5a0a2a55a6495e0ff21b2503f9b5c99c
-
SSDEEP
768:6B7HBXFw82t2C80lyaZ4jX05RfX5XciJr480tcW:u7HZFwzlyaZTSi+80tcW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2760 cnwog.exe -
Loads dropped DLL 1 IoCs
pid Process 3024 2840c8fa8a4e14faf99976fc8dcfb770N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2840c8fa8a4e14faf99976fc8dcfb770N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cnwog.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2760 3024 2840c8fa8a4e14faf99976fc8dcfb770N.exe 30 PID 3024 wrote to memory of 2760 3024 2840c8fa8a4e14faf99976fc8dcfb770N.exe 30 PID 3024 wrote to memory of 2760 3024 2840c8fa8a4e14faf99976fc8dcfb770N.exe 30 PID 3024 wrote to memory of 2760 3024 2840c8fa8a4e14faf99976fc8dcfb770N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2840c8fa8a4e14faf99976fc8dcfb770N.exe"C:\Users\Admin\AppData\Local\Temp\2840c8fa8a4e14faf99976fc8dcfb770N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\cnwog.exe"C:\Users\Admin\AppData\Local\Temp\cnwog.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5ddd68e9289fa23c9d647776119f3aac9
SHA1e423d478f05255a78a68376f74ceabc7aeb6a742
SHA2566258f1ea7cb36d415161ea81a1f20069b4a0b7477b7874ec593ea6101c9a7e20
SHA51260a9a105d8250392b62ed30bc10e573e41473c059c203c661ede53e4926285f07b8b481082d081a24e79b2a22607f417478760a3495075173003e8bf3e753c68