Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
3b79514bd6363e670f982a9f55daa070N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3b79514bd6363e670f982a9f55daa070N.exe
Resource
win10v2004-20240802-en
General
-
Target
3b79514bd6363e670f982a9f55daa070N.exe
-
Size
179KB
-
MD5
3b79514bd6363e670f982a9f55daa070
-
SHA1
1dc003d4c75e13ff325dee8161e97011792141a4
-
SHA256
c46400e9c40c1a5e68fe2b148e716f09448ed0626072129db27e766192d33bb9
-
SHA512
27c1d44fa34bd252fdf548d5f43640ba7cfb32ff94efd514a6d2b7e18e0049dd5db102bbb37154c73cc87961f98bcdec23e1840a0e09e1f01fe5580f54110bc6
-
SSDEEP
3072:DXTTASJKf2n5AxE2NpxOa2XdU2QF4s5XgIDFyHb8kHofL/09rGB:DvASJKenie2xT2NU2OTFQb8Fb0IB
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent5 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\FD2280~1.EXE" svchost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Avira svchost.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\AVAST Software\Avast svchost.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Eset\Nod svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1824 set thread context of 2744 1824 3b79514bd6363e670f982a9f55daa070N.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b79514bd6363e670f982a9f55daa070N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2744 1824 3b79514bd6363e670f982a9f55daa070N.exe 30 PID 1824 wrote to memory of 2744 1824 3b79514bd6363e670f982a9f55daa070N.exe 30 PID 1824 wrote to memory of 2744 1824 3b79514bd6363e670f982a9f55daa070N.exe 30 PID 1824 wrote to memory of 2744 1824 3b79514bd6363e670f982a9f55daa070N.exe 30 PID 1824 wrote to memory of 2744 1824 3b79514bd6363e670f982a9f55daa070N.exe 30 PID 1824 wrote to memory of 2744 1824 3b79514bd6363e670f982a9f55daa070N.exe 30 PID 1824 wrote to memory of 2744 1824 3b79514bd6363e670f982a9f55daa070N.exe 30 PID 1824 wrote to memory of 2744 1824 3b79514bd6363e670f982a9f55daa070N.exe 30 PID 1824 wrote to memory of 2744 1824 3b79514bd6363e670f982a9f55daa070N.exe 30 PID 1824 wrote to memory of 2744 1824 3b79514bd6363e670f982a9f55daa070N.exe 30 PID 1824 wrote to memory of 2744 1824 3b79514bd6363e670f982a9f55daa070N.exe 30 PID 1824 wrote to memory of 2744 1824 3b79514bd6363e670f982a9f55daa070N.exe 30 PID 1824 wrote to memory of 1352 1824 3b79514bd6363e670f982a9f55daa070N.exe 31 PID 1824 wrote to memory of 1352 1824 3b79514bd6363e670f982a9f55daa070N.exe 31 PID 1824 wrote to memory of 1352 1824 3b79514bd6363e670f982a9f55daa070N.exe 31 PID 1824 wrote to memory of 1352 1824 3b79514bd6363e670f982a9f55daa070N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b79514bd6363e670f982a9f55daa070N.exe"C:\Users\Admin\AppData\Local\Temp\3b79514bd6363e670f982a9f55daa070N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\svchost.exeC:\ProgramData\fd2280fj0.exe2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\fdrCF9.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\3b79514bd6363e670f982a9f55daa070N.exe""2⤵
- System Location Discovery: System Language Discovery
PID:1352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34B
MD53b87b99800f3b6d48f2abc3fc41d4711
SHA1cc4ce6fa07572c9d5cbca0938d973666442d1de9
SHA256dd8f9cecc9113f484f8176686c3483cc51e49169dd790112d5a989f0f3e43c81
SHA51280109888851a497adda70fc89fe137d80d85f8c5b379de3256679a0234032e206dfdc127b0539c52fe0e590c7a6b552ee2e6a897f10f4c7fd2291eaca9ba1d7f