Analysis
-
max time kernel
30s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 13:12
Static task
static1
Behavioral task
behavioral1
Sample
8397c3d2363d9a31483e8113a0e8a7b0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8397c3d2363d9a31483e8113a0e8a7b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
8397c3d2363d9a31483e8113a0e8a7b0N.exe
-
Size
96KB
-
MD5
8397c3d2363d9a31483e8113a0e8a7b0
-
SHA1
deb6ea523ee2d12e0c38dcc103ba4fce4558b355
-
SHA256
1605bb64e40e88c32c72575dc5d0a1c8b20aee94ddb7c5dd21a0d8eeb6ce6f9f
-
SHA512
92c0a3d001aba5decc5ee28ea807312b980bd59b848d0cc5835e66ad8cc3baf99830295da6d399469412ff7fd5d08e81e435390926eec0b58705926d1b223b7a
-
SSDEEP
1536:J+jorYjLZoTIsFzfuifMfP0hWagAziqWyUry5ZMHeoRQ+xR5R45WtqV9R2R462iW:JzkXZoFju9vkzifOvoe+xHrtG9MW3+3W
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 8397c3d2363d9a31483e8113a0e8a7b0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 8397c3d2363d9a31483e8113a0e8a7b0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2712 Cacacg32.exe -
Loads dropped DLL 6 IoCs
pid Process 2880 8397c3d2363d9a31483e8113a0e8a7b0N.exe 2880 8397c3d2363d9a31483e8113a0e8a7b0N.exe 3016 WerFault.exe 3016 WerFault.exe 3016 WerFault.exe 3016 WerFault.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Cacacg32.exe 8397c3d2363d9a31483e8113a0e8a7b0N.exe File opened for modification C:\Windows\SysWOW64\Cacacg32.exe 8397c3d2363d9a31483e8113a0e8a7b0N.exe File created C:\Windows\SysWOW64\Fdlpjk32.dll 8397c3d2363d9a31483e8113a0e8a7b0N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3016 2712 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8397c3d2363d9a31483e8113a0e8a7b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cacacg32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 8397c3d2363d9a31483e8113a0e8a7b0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 8397c3d2363d9a31483e8113a0e8a7b0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 8397c3d2363d9a31483e8113a0e8a7b0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} 8397c3d2363d9a31483e8113a0e8a7b0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdlpjk32.dll" 8397c3d2363d9a31483e8113a0e8a7b0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" 8397c3d2363d9a31483e8113a0e8a7b0N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2712 2880 8397c3d2363d9a31483e8113a0e8a7b0N.exe 30 PID 2880 wrote to memory of 2712 2880 8397c3d2363d9a31483e8113a0e8a7b0N.exe 30 PID 2880 wrote to memory of 2712 2880 8397c3d2363d9a31483e8113a0e8a7b0N.exe 30 PID 2880 wrote to memory of 2712 2880 8397c3d2363d9a31483e8113a0e8a7b0N.exe 30 PID 2712 wrote to memory of 3016 2712 Cacacg32.exe 31 PID 2712 wrote to memory of 3016 2712 Cacacg32.exe 31 PID 2712 wrote to memory of 3016 2712 Cacacg32.exe 31 PID 2712 wrote to memory of 3016 2712 Cacacg32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8397c3d2363d9a31483e8113a0e8a7b0N.exe"C:\Users\Admin\AppData\Local\Temp\8397c3d2363d9a31483e8113a0e8a7b0N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\Cacacg32.exeC:\Windows\system32\Cacacg32.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 1403⤵
- Loads dropped DLL
- Program crash
PID:3016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD50be425321d169acdbb09c4da1e0b1ee2
SHA1aa19c5d3c78573401c59539993d40e16081f39ca
SHA256fd0fe6b9b013dbea93418fdd82150accd76adcf027e0d39fbc680932fb7049ef
SHA512b914df58690933dc0287595f99a0557e7f2d2c84132565303b3689c39ebe911d7f15ae67881a5f591b6ec0d75c98f99bf8fc6aa105af4aad3ef47987abb6bf7f