Analysis
-
max time kernel
30s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 12:42
Behavioral task
behavioral1
Sample
6e5416a8514789535124d5f245236de0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6e5416a8514789535124d5f245236de0N.exe
Resource
win10v2004-20240802-en
General
-
Target
6e5416a8514789535124d5f245236de0N.exe
-
Size
134KB
-
MD5
6e5416a8514789535124d5f245236de0
-
SHA1
345075bdb62e4e44e6c0a9c96150e2beac14c5a6
-
SHA256
6a0f3730fc5f5588aaea8e2a2b6c878405c90d23d8bdc1683262d09a458509e1
-
SHA512
3bf8c5b03db4fecbb0e2f1f1aa0e50159aa3d383e922ef9cacc81b05b50a80d4476649bc7b69058f91e6b02477cefe1546c4b0f39e82264129a8e8587261a9a1
-
SSDEEP
1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SOz:YfU/WF6QMauSuiWNi9eNOl0007NZIOz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2272 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2764 wuauclt.exe -
Loads dropped DLL 1 IoCs
pid Process 2668 6e5416a8514789535124d5f245236de0N.exe -
resource yara_rule behavioral1/memory/2668-0-0x0000000000050000-0x0000000000078000-memory.dmp upx behavioral1/files/0x0008000000016dc7-2.dat upx behavioral1/memory/2764-7-0x0000000000010000-0x0000000000038000-memory.dmp upx behavioral1/memory/2668-8-0x0000000000050000-0x0000000000078000-memory.dmp upx behavioral1/memory/2668-10-0x0000000000050000-0x0000000000078000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\wuauclt.exe\" /run" 6e5416a8514789535124d5f245236de0N.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e5416a8514789535124d5f245236de0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2764 2668 6e5416a8514789535124d5f245236de0N.exe 31 PID 2668 wrote to memory of 2764 2668 6e5416a8514789535124d5f245236de0N.exe 31 PID 2668 wrote to memory of 2764 2668 6e5416a8514789535124d5f245236de0N.exe 31 PID 2668 wrote to memory of 2764 2668 6e5416a8514789535124d5f245236de0N.exe 31 PID 2668 wrote to memory of 2272 2668 6e5416a8514789535124d5f245236de0N.exe 32 PID 2668 wrote to memory of 2272 2668 6e5416a8514789535124d5f245236de0N.exe 32 PID 2668 wrote to memory of 2272 2668 6e5416a8514789535124d5f245236de0N.exe 32 PID 2668 wrote to memory of 2272 2668 6e5416a8514789535124d5f245236de0N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e5416a8514789535124d5f245236de0N.exe"C:\Users\Admin\AppData\Local\Temp\6e5416a8514789535124d5f245236de0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\ProgramData\Update\wuauclt.exe"C:\ProgramData\Update\wuauclt.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\6e5416a8514789535124d5f245236de0N.exe" >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5f7d4e6fa3845a996adc734ba87305949
SHA18e6d2a1c3a82a36348cb8c34bc1954e5bf3249a2
SHA2566838f1536068040aab4eb97bcbe0547a1e31b614fb9c941ac46e7a5fc1e85f0c
SHA51292d282eb7dc5576c6d589a84ff88cee677ca37ff6fdaec0cc79997436d8638391528b49f91c3a06373a8054514b8ee5c09a8ae0528312be4eaeca6c6b35cd5be