Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27-08-2024 03:16
Static task
static1
Behavioral task
behavioral1
Sample
bd70533a197b804454e56b1926c3adfd5880d2ee26fb393db923a09f18d8d661.exe
Resource
win7-20240705-en
General
-
Target
bd70533a197b804454e56b1926c3adfd5880d2ee26fb393db923a09f18d8d661.exe
-
Size
724KB
-
MD5
7ff8fb3e91efc5da071a140880ed3f5b
-
SHA1
6919948f570e388fdd2960925fa39030894482f0
-
SHA256
bd70533a197b804454e56b1926c3adfd5880d2ee26fb393db923a09f18d8d661
-
SHA512
51e459cd7fa0b29fc418ecd573a83f0eb93d4374be34a78a825d8cc3ce0216d83f8fcf10e141efb030c83df7d5d95681abbd50b9ae42d23cf9916e99d58280ca
-
SSDEEP
12288:K2c1/SCCBpcdznj0cHYKlI1DsAGqekL47Yql:ZK91dzj0FKa1BZtG
Malware Config
Extracted
systembc
185.215.113.32:4000
78.47.64.46:4000
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\wow64.job bd70533a197b804454e56b1926c3adfd5880d2ee26fb393db923a09f18d8d661.exe File opened for modification C:\Windows\Tasks\wow64.job bd70533a197b804454e56b1926c3adfd5880d2ee26fb393db923a09f18d8d661.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd70533a197b804454e56b1926c3adfd5880d2ee26fb393db923a09f18d8d661.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd70533a197b804454e56b1926c3adfd5880d2ee26fb393db923a09f18d8d661.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2788 2660 taskeng.exe 31 PID 2660 wrote to memory of 2788 2660 taskeng.exe 31 PID 2660 wrote to memory of 2788 2660 taskeng.exe 31 PID 2660 wrote to memory of 2788 2660 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd70533a197b804454e56b1926c3adfd5880d2ee26fb393db923a09f18d8d661.exe"C:\Users\Admin\AppData\Local\Temp\bd70533a197b804454e56b1926c3adfd5880d2ee26fb393db923a09f18d8d661.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3040
-
C:\Windows\system32\taskeng.exetaskeng.exe {216F3765-D90C-42BD-9021-208E3FAC8FD4} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\bd70533a197b804454e56b1926c3adfd5880d2ee26fb393db923a09f18d8d661.exeC:\Users\Admin\AppData\Local\Temp\bd70533a197b804454e56b1926c3adfd5880d2ee26fb393db923a09f18d8d661.exe start2⤵
- System Location Discovery: System Language Discovery
PID:2788
-