Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 04:04
Static task
static1
Behavioral task
behavioral1
Sample
e00a57d19a449370f7d0384aa32ddde89dd0fe21937ae1f24fa3037598dd0ec4.exe
Resource
win7-20240708-en
General
-
Target
e00a57d19a449370f7d0384aa32ddde89dd0fe21937ae1f24fa3037598dd0ec4.exe
-
Size
674KB
-
MD5
6fa8227ddbe4cd86d75d82da8b40c1c1
-
SHA1
d981c3f40eb7a508f17bdaed7ade99f548575a7b
-
SHA256
e00a57d19a449370f7d0384aa32ddde89dd0fe21937ae1f24fa3037598dd0ec4
-
SHA512
5da29ad44c64ca536ed5ba6485a9e0dc5d3728533265daa74a363ccd4d7823c63ef6b00234bb40c040ac812cfe30f7b9858cc31b7cb4d6a8d9e952620c9829ce
-
SSDEEP
12288:D0iiYQPr1bj4UU5NTIkMhE2F1cL00PzRnVKf1hurETuVu:gRnBFCN9qEscLrVKdhNZ
Malware Config
Extracted
systembc
185.215.113.32:4000
78.47.64.46:4000
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
e00a57d19a449370f7d0384aa32ddde89dd0fe21937ae1f24fa3037598dd0ec4.exedescription ioc Process File created C:\Windows\Tasks\wow64.job e00a57d19a449370f7d0384aa32ddde89dd0fe21937ae1f24fa3037598dd0ec4.exe File opened for modification C:\Windows\Tasks\wow64.job e00a57d19a449370f7d0384aa32ddde89dd0fe21937ae1f24fa3037598dd0ec4.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e00a57d19a449370f7d0384aa32ddde89dd0fe21937ae1f24fa3037598dd0ec4.exee00a57d19a449370f7d0384aa32ddde89dd0fe21937ae1f24fa3037598dd0ec4.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e00a57d19a449370f7d0384aa32ddde89dd0fe21937ae1f24fa3037598dd0ec4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e00a57d19a449370f7d0384aa32ddde89dd0fe21937ae1f24fa3037598dd0ec4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid Process procid_target PID 1704 wrote to memory of 2396 1704 taskeng.exe 31 PID 1704 wrote to memory of 2396 1704 taskeng.exe 31 PID 1704 wrote to memory of 2396 1704 taskeng.exe 31 PID 1704 wrote to memory of 2396 1704 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e00a57d19a449370f7d0384aa32ddde89dd0fe21937ae1f24fa3037598dd0ec4.exe"C:\Users\Admin\AppData\Local\Temp\e00a57d19a449370f7d0384aa32ddde89dd0fe21937ae1f24fa3037598dd0ec4.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2500
-
C:\Windows\system32\taskeng.exetaskeng.exe {B93D5890-952F-4E4A-AD9B-47D0DA0D621E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\e00a57d19a449370f7d0384aa32ddde89dd0fe21937ae1f24fa3037598dd0ec4.exeC:\Users\Admin\AppData\Local\Temp\e00a57d19a449370f7d0384aa32ddde89dd0fe21937ae1f24fa3037598dd0ec4.exe start2⤵
- System Location Discovery: System Language Discovery
PID:2396
-