Analysis
-
max time kernel
112s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 21:19
Static task
static1
Behavioral task
behavioral1
Sample
b2eb69d01ec25bb62c356a19085ce3e0N.exe
Resource
win7-20240704-en
General
-
Target
b2eb69d01ec25bb62c356a19085ce3e0N.exe
-
Size
782KB
-
MD5
b2eb69d01ec25bb62c356a19085ce3e0
-
SHA1
69aa9470efcb9651313dd7c09b43a10edd202b97
-
SHA256
ce7b80ccdd02d7df3fd1215e0673cd51ddc80d8acd5e6db4fee856d0b307de42
-
SHA512
3da55cdee9d6ba4f55c19132dbe12d0bc3b53c4f34b41ecaa5a5a6059903a1764cb3bbdbf7bc8710b2151577a423474062daf372b6116223975fa0b4271647e7
-
SSDEEP
12288:hpIdn0wvs3tS+Zn2ocK9hyVDI9snwxrOBd34taZo7Oeci:rcn03bV2or2VkQotaZo7
Malware Config
Extracted
systembc
185.215.113.32:4000
78.47.64.46:4000
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
b2eb69d01ec25bb62c356a19085ce3e0N.exedescription ioc process File created C:\Windows\Tasks\wow64.job b2eb69d01ec25bb62c356a19085ce3e0N.exe File opened for modification C:\Windows\Tasks\wow64.job b2eb69d01ec25bb62c356a19085ce3e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b2eb69d01ec25bb62c356a19085ce3e0N.exeb2eb69d01ec25bb62c356a19085ce3e0N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2eb69d01ec25bb62c356a19085ce3e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2eb69d01ec25bb62c356a19085ce3e0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 2212 wrote to memory of 1336 2212 taskeng.exe b2eb69d01ec25bb62c356a19085ce3e0N.exe PID 2212 wrote to memory of 1336 2212 taskeng.exe b2eb69d01ec25bb62c356a19085ce3e0N.exe PID 2212 wrote to memory of 1336 2212 taskeng.exe b2eb69d01ec25bb62c356a19085ce3e0N.exe PID 2212 wrote to memory of 1336 2212 taskeng.exe b2eb69d01ec25bb62c356a19085ce3e0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2eb69d01ec25bb62c356a19085ce3e0N.exe"C:\Users\Admin\AppData\Local\Temp\b2eb69d01ec25bb62c356a19085ce3e0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2472
-
C:\Windows\system32\taskeng.exetaskeng.exe {CE8C06EF-6FA9-4C89-908E-6C29F56061BE} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\b2eb69d01ec25bb62c356a19085ce3e0N.exeC:\Users\Admin\AppData\Local\Temp\b2eb69d01ec25bb62c356a19085ce3e0N.exe start2⤵
- System Location Discovery: System Language Discovery
PID:1336
-