Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 19:52
Behavioral task
behavioral1
Sample
c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe
Resource
win7-20240705-en
General
-
Target
c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe
-
Size
16.0MB
-
MD5
e4b0b76582285f9207afd429c049c15f
-
SHA1
2e62956c712e41038a91680af274aee6be03a46f
-
SHA256
c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769
-
SHA512
68774b1e3f771de98be1a590916f0e84ae38a4a327e7b71235afd24a69ea8b465fe346e1aaf4d4f1d3385ace9316cb4538dccabea4aa82baae07d1db6f7e2b00
-
SSDEEP
393216:bt8vOkvm3O4NsEkm5zAm9D5jpL1K6mY7j8gGYmudziqOlvzAmy:bpWdbov9BpZ1mYP/8lzAR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2696 c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe -
Loads dropped DLL 1 IoCs
pid Process 1660 c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe -
resource yara_rule behavioral1/memory/1660-0-0x0000000000400000-0x0000000000D49000-memory.dmp upx behavioral1/files/0x0007000000019246-5.dat upx behavioral1/memory/2696-9-0x0000000000400000-0x0000000000D49000-memory.dmp upx behavioral1/memory/1660-12-0x0000000000400000-0x0000000000D49000-memory.dmp upx behavioral1/memory/2696-19-0x0000000000400000-0x0000000000D49000-memory.dmp upx behavioral1/memory/2696-20-0x0000000000400000-0x0000000000D49000-memory.dmp upx behavioral1/memory/2696-25-0x0000000000400000-0x0000000000D49000-memory.dmp upx behavioral1/memory/2696-27-0x0000000000400000-0x0000000000D49000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\K: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\L: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\O: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\V: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\A: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\H: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\J: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\N: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\P: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\R: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\S: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\T: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\B: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\I: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\M: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\Q: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\U: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\X: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\Y: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\G: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\W: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe File opened (read-only) \??\Z: c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1660 c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe 1660 c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe 1660 c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe 1660 c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe 1660 c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe 2696 c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe 2696 c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe 2696 c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe 2696 c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe 2696 c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2696 1660 c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe 30 PID 1660 wrote to memory of 2696 1660 c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe 30 PID 1660 wrote to memory of 2696 1660 c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe 30 PID 1660 wrote to memory of 2696 1660 c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe"C:\Users\Admin\AppData\Local\Temp\c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\ÁÒ»ð´ó¼«Æ·ÈÈѪ´«Ææ\c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exeC:\ÁÒ»ð´ó¼«Æ·ÈÈѪ´«Ææ\c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21B
MD56ba8ee0c1a17175254c8bb7a14d538b6
SHA108bde5f167eae3730c16e3e65c2470e0e4aa47ce
SHA25623ee7187c31eb535796d2592c6cfd5e89b71f3036533f42ff842579ed6cd3758
SHA51203235924ef117f62d681733a8b6af3338c6421f236d50943b1eee411567c824d78e8a440202dc865151f1ca70722d75eb22fd9b6268616b5b32026c697f79fc3
-
Filesize
16.0MB
MD5e4b0b76582285f9207afd429c049c15f
SHA12e62956c712e41038a91680af274aee6be03a46f
SHA256c882b82646dcff5708c81b9cd777ed2855065141098e4499b5e36713d0a27769
SHA51268774b1e3f771de98be1a590916f0e84ae38a4a327e7b71235afd24a69ea8b465fe346e1aaf4d4f1d3385ace9316cb4538dccabea4aa82baae07d1db6f7e2b00