Analysis
-
max time kernel
35s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 21:33
Behavioral task
behavioral1
Sample
08eb244735637dc376ad3f4c78dce6e0N.exe
Resource
win7-20240705-en
General
-
Target
08eb244735637dc376ad3f4c78dce6e0N.exe
-
Size
1003KB
-
MD5
08eb244735637dc376ad3f4c78dce6e0
-
SHA1
87e236caad767f6b6c0fd0f1b17b57f8558050a9
-
SHA256
11be9306b4190f274b59ff3cf899a6ed9cf1983f1408835b688cf3104903e982
-
SHA512
0613ae3539bab73a0c9a77ad5fdc75fd5b8437be6d366b315777cbf826380a157f69381cd5bfdedbca2d113223cf058441e8d95cec79332154a588c6e5521e6b
-
SSDEEP
24576:zz7aNFRAbbA7YvRjhbgzgqsiT78qJd5x:zz7aNnA3NvRjlgzOs78qJdf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 308 08eb244735637dc376ad3f4c78dce6e0N.exe -
Executes dropped EXE 1 IoCs
pid Process 308 08eb244735637dc376ad3f4c78dce6e0N.exe -
Loads dropped DLL 1 IoCs
pid Process 588 08eb244735637dc376ad3f4c78dce6e0N.exe -
resource yara_rule behavioral1/memory/588-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/memory/308-28-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x0009000000012281-8.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08eb244735637dc376ad3f4c78dce6e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08eb244735637dc376ad3f4c78dce6e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2948 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 588 08eb244735637dc376ad3f4c78dce6e0N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 588 08eb244735637dc376ad3f4c78dce6e0N.exe 308 08eb244735637dc376ad3f4c78dce6e0N.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 588 wrote to memory of 308 588 08eb244735637dc376ad3f4c78dce6e0N.exe 32 PID 588 wrote to memory of 308 588 08eb244735637dc376ad3f4c78dce6e0N.exe 32 PID 588 wrote to memory of 308 588 08eb244735637dc376ad3f4c78dce6e0N.exe 32 PID 588 wrote to memory of 308 588 08eb244735637dc376ad3f4c78dce6e0N.exe 32 PID 308 wrote to memory of 2948 308 08eb244735637dc376ad3f4c78dce6e0N.exe 33 PID 308 wrote to memory of 2948 308 08eb244735637dc376ad3f4c78dce6e0N.exe 33 PID 308 wrote to memory of 2948 308 08eb244735637dc376ad3f4c78dce6e0N.exe 33 PID 308 wrote to memory of 2948 308 08eb244735637dc376ad3f4c78dce6e0N.exe 33 PID 308 wrote to memory of 2804 308 08eb244735637dc376ad3f4c78dce6e0N.exe 35 PID 308 wrote to memory of 2804 308 08eb244735637dc376ad3f4c78dce6e0N.exe 35 PID 308 wrote to memory of 2804 308 08eb244735637dc376ad3f4c78dce6e0N.exe 35 PID 308 wrote to memory of 2804 308 08eb244735637dc376ad3f4c78dce6e0N.exe 35 PID 2804 wrote to memory of 2832 2804 cmd.exe 37 PID 2804 wrote to memory of 2832 2804 cmd.exe 37 PID 2804 wrote to memory of 2832 2804 cmd.exe 37 PID 2804 wrote to memory of 2832 2804 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\08eb244735637dc376ad3f4c78dce6e0N.exe"C:\Users\Admin\AppData\Local\Temp\08eb244735637dc376ad3f4c78dce6e0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\08eb244735637dc376ad3f4c78dce6e0N.exeC:\Users\Admin\AppData\Local\Temp\08eb244735637dc376ad3f4c78dce6e0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\08eb244735637dc376ad3f4c78dce6e0N.exe" /TN IEYWFAGMc26e /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2948
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN IEYWFAGMc26e > C:\Users\Admin\AppData\Local\Temp\Idh5s.xml3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN IEYWFAGMc26e4⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1003KB
MD598750428d36c3b87517708708dcb844d
SHA12b1866b89b64415945cb4762ca2b857b1064ea14
SHA2563ba297498dbbb711b3c110e26bf8ad1089d8cf39f456b3b8a6de5162f5c9cf87
SHA5125a4a627b254b5c04cd19e778a6326e139c19976ba5b2de9293d2d0728b312eee3a1719b70a36235d2c34805a0635ed897651cb67ded75ba8cbc75b83ce06b547
-
Filesize
1KB
MD5fb40585b74736173b9655b0d7e035230
SHA1c3a1f4ab79e7a7db67b75434980f221fa7a33c3f
SHA2568e1a21dc4b047099c00ce96411d9182da44d9010c26e9efd620db8745ab4dc19
SHA51283b6c2bb3355c182d5fa797763ef523aebd843c11fd5501c2b3cb2ad0285cf5807a6d2d816a69380f98a8f9169b193597a0b811ac0aa784c0943df35336f3042