Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 20:18
Behavioral task
behavioral1
Sample
d7b608e9bd810f7ba30dd26a002a85f0N.exe
Resource
win7-20240708-en
General
-
Target
d7b608e9bd810f7ba30dd26a002a85f0N.exe
-
Size
47KB
-
MD5
d7b608e9bd810f7ba30dd26a002a85f0
-
SHA1
81c89c70376906113de200b46e20e33a64c879d4
-
SHA256
2cf322badca9a5b4a7a4f8d8e4f86cefc9972eb96091b461ace21216fb0a7a4d
-
SHA512
6873b8f54ab688c514cceb5b834e80203ff8b0d9712c566bf016ecf7504b6e4cd760e6815114e8b4316eb0fd1df44c9a8f299f449c8c6bdf37d4f1c661eb82c6
-
SSDEEP
768:Iv9ilrnywLsYg+0yq2vWdT9SOaNou0yWH7oXzO8ZGjSjAsOmA0acFqoXcb:fjxsz40yvXHGjUAsOPkHcb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2584 conwurm.exe -
Loads dropped DLL 1 IoCs
pid Process 964 d7b608e9bd810f7ba30dd26a002a85f0N.exe -
resource yara_rule behavioral1/memory/964-0-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/files/0x000700000001211b-6.dat upx behavioral1/memory/964-11-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/2584-12-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/2584-16-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7b608e9bd810f7ba30dd26a002a85f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conwurm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 964 wrote to memory of 2584 964 d7b608e9bd810f7ba30dd26a002a85f0N.exe 30 PID 964 wrote to memory of 2584 964 d7b608e9bd810f7ba30dd26a002a85f0N.exe 30 PID 964 wrote to memory of 2584 964 d7b608e9bd810f7ba30dd26a002a85f0N.exe 30 PID 964 wrote to memory of 2584 964 d7b608e9bd810f7ba30dd26a002a85f0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7b608e9bd810f7ba30dd26a002a85f0N.exe"C:\Users\Admin\AppData\Local\Temp\d7b608e9bd810f7ba30dd26a002a85f0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\conwurm.exe"C:\Users\Admin\AppData\Local\Temp\conwurm.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5573f22c799310dbeb8373a551cb533b7
SHA1c79deb914237efdba3d95c0ae617848ef4e165fb
SHA2565af84db26cd1bdade0265c55c4b166b5db96073e5c7557f18b3f2084147ed193
SHA51293e58d9aea769c6e87d3b90ff0244a3bb60a3e7fa90341bbe3271fd4a74550b065cbad425715d59d0de082718db5839dc9bce5d4688225b25506a4a1175bd6ea