Analysis
-
max time kernel
100s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 23:32
Behavioral task
behavioral1
Sample
91cb700416b4dc5129f636da79572f80N.exe
Resource
win7-20240705-en
General
-
Target
91cb700416b4dc5129f636da79572f80N.exe
-
Size
38KB
-
MD5
91cb700416b4dc5129f636da79572f80
-
SHA1
136b79f12cb8828eb3587a03c52243e5edca0170
-
SHA256
1f0e767c629657fd7067c5ba247813e0bbf867b005138de4d64f5c4b6690c0fa
-
SHA512
afa6e9cb2eb2c99b6333b6a0c92178ef7dddeb7363587cb82fb5b15ba2f53c9b5de9fe5212bf31c9e46b1605a6da4b0033cd90cf105f1d3ef605d14054aca8d9
-
SSDEEP
768:Nzj1JegVa3Gry+uELEmITCs/NUZ6nZdYbCLECkrQoP9fmF2f1cONhv:NWQa2TLEmITcoQxfllfmS1cODv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2956 smss.exe -
resource yara_rule behavioral2/memory/5004-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/files/0x000800000002345c-5.dat upx behavioral2/memory/5004-11-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/2956-13-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe 91cb700416b4dc5129f636da79572f80N.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2928 sc.exe 3032 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91cb700416b4dc5129f636da79572f80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5004 91cb700416b4dc5129f636da79572f80N.exe 2956 smss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5004 wrote to memory of 2928 5004 91cb700416b4dc5129f636da79572f80N.exe 84 PID 5004 wrote to memory of 2928 5004 91cb700416b4dc5129f636da79572f80N.exe 84 PID 5004 wrote to memory of 2928 5004 91cb700416b4dc5129f636da79572f80N.exe 84 PID 5004 wrote to memory of 2956 5004 91cb700416b4dc5129f636da79572f80N.exe 86 PID 5004 wrote to memory of 2956 5004 91cb700416b4dc5129f636da79572f80N.exe 86 PID 5004 wrote to memory of 2956 5004 91cb700416b4dc5129f636da79572f80N.exe 86 PID 2956 wrote to memory of 3032 2956 smss.exe 87 PID 2956 wrote to memory of 3032 2956 smss.exe 87 PID 2956 wrote to memory of 3032 2956 smss.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\91cb700416b4dc5129f636da79572f80N.exe"C:\Users\Admin\AppData\Local\Temp\91cb700416b4dc5129f636da79572f80N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD52e8a8bfebcc413814c296320505a3b1a
SHA1ef5b70fedb8a7b12f308ff28a5cd6dfb5a269f11
SHA256c0d67f9e394fb9283cd3f4c35eface9bf094e0be757fdf9e137c42bc27ead0d9
SHA512885728721d6556766e82468177e2d4765ef1622f446e153757e00a8edf31825dfb3a3b82a361b5fb60094b9fc4970ee42d4f2ea8b4669c9ca0ec3ef882721207