Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe
Resource
win10v2004-20240802-en
General
-
Target
fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe
-
Size
448KB
-
MD5
fb8f8634e228a5cdb7ec40b88b0b0dc0
-
SHA1
aaf306db05fdfd9837af045dfb10b2eec85e2118
-
SHA256
1e07df0f9b61bc8af51271540177e85b7f0e784e3becd8c5948c2a0b923ff2c2
-
SHA512
aa614d15f0d3d24f62b587fc053052f12e30a5cc0aab229c5ceb03c3e2c3e7230ef0d890e111ba2bbceb89b972a68bb5d253618e171d7f485f5eb2a564888998
-
SSDEEP
6144:j79jE+Fs0tU7ljAtFtqnjkEjWbjcSbcY+CaQdaFOY4iGFYtR:NEYXzRqnjkFbz+xt4vF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2472 YVCNZ.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\windows\YVCNZ.exe fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe File opened for modification C:\windows\YVCNZ.exe fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe File created C:\windows\YVCNZ.exe.bat fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YVCNZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1440 fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe 1440 fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe 2472 YVCNZ.exe 2472 YVCNZ.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1440 fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe 1440 fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe 2472 YVCNZ.exe 2472 YVCNZ.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1772 1440 fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe 31 PID 1440 wrote to memory of 1772 1440 fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe 31 PID 1440 wrote to memory of 1772 1440 fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe 31 PID 1440 wrote to memory of 1772 1440 fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe 31 PID 1772 wrote to memory of 2472 1772 cmd.exe 33 PID 1772 wrote to memory of 2472 1772 cmd.exe 33 PID 1772 wrote to memory of 2472 1772 cmd.exe 33 PID 1772 wrote to memory of 2472 1772 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe"C:\Users\Admin\AppData\Local\Temp\fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\YVCNZ.exe.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\windows\YVCNZ.exeC:\windows\YVCNZ.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2472
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD56af1e813d7c4edde23f245e40e6a693d
SHA1c248b32502beabe8ad6bc3fe07e44db2b8e93e61
SHA256ee44a8b00d68c7a747b4bdce6e5755b99f3226ec4c9dd68f8e75824930b7b9df
SHA512e3921e61a67c6a90b5983b5fbec7c063f847249c9d68504220df2d040ac3b8db3662173cba407ca0f56a48fe045e5e63d0f0036b783b18906ce4133f5b82a291
-
Filesize
56B
MD5d017671bf93fd881a7c8d09c5a265009
SHA1f06af49582516592db00e854061c6bb27d928a41
SHA2565bc7c909df395fd7017acc1d6219b9e32b1110ae56bf4870a89a44241e9b0742
SHA5128e4b91499503e03009bdbb592dd7bd9f0a188172bd5402c34f7c75ce54c7b3a983ee4a172d033b8ff51178da0ad7c664f228e576ec0f8794a4da2bb55c5b3a1e