Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 01:11
Static task
static1
Behavioral task
behavioral1
Sample
13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe
Resource
win10v2004-20240802-en
General
-
Target
13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe
-
Size
1.5MB
-
MD5
180ad8fe3294d5cbf1508f3576c70f1c
-
SHA1
831c8ef7b3efedae003526a87139e806c713ed24
-
SHA256
13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e
-
SHA512
d5a7ece40082978640d886b33729255c4b47a3bac6fac1973eb475599bf3c79795b2314dd4ae6c87685c56a0c9f9990a42a61d0ba9482be81489fae48900933c
-
SSDEEP
24576:qIgqdRkAM4OF+PMwrSVlbmfDYkhDvGtjXtGUAF9kJ7MqudghfEuCj0hThiHHxlhg:qIeMw6kbQlYSRUT7ofIlohsgm
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EXE.lnk 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe -
Executes dropped EXE 1 IoCs
pid Process 208 EXE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXE.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3028 cmd.exe 876 PING.EXE 1956 PING.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 876 PING.EXE 1956 PING.EXE -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 208 EXE.exe 208 EXE.exe 208 EXE.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe Token: SeDebugPrivilege 208 EXE.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4724 wrote to memory of 3028 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 98 PID 4724 wrote to memory of 3028 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 98 PID 4724 wrote to memory of 3028 4724 13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe 98 PID 3028 wrote to memory of 876 3028 cmd.exe 100 PID 3028 wrote to memory of 876 3028 cmd.exe 100 PID 3028 wrote to memory of 876 3028 cmd.exe 100 PID 3028 wrote to memory of 1956 3028 cmd.exe 103 PID 3028 wrote to memory of 1956 3028 cmd.exe 103 PID 3028 wrote to memory of 1956 3028 cmd.exe 103 PID 3028 wrote to memory of 208 3028 cmd.exe 112 PID 3028 wrote to memory of 208 3028 cmd.exe 112 PID 3028 wrote to memory of 208 3028 cmd.exe 112 PID 208 wrote to memory of 1416 208 EXE.exe 116 PID 208 wrote to memory of 1416 208 EXE.exe 116 PID 208 wrote to memory of 1416 208 EXE.exe 116 PID 208 wrote to memory of 1416 208 EXE.exe 116 PID 208 wrote to memory of 1416 208 EXE.exe 116 PID 208 wrote to memory of 1416 208 EXE.exe 116 PID 208 wrote to memory of 1416 208 EXE.exe 116 PID 208 wrote to memory of 1416 208 EXE.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe"C:\Users\Admin\AppData\Local\Temp\13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 41 > nul && copy "C:\Users\Admin\AppData\Local\Temp\13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e.exe" "C:\Users\Admin\AppData\Roaming\EXE.exe" && ping 127.0.0.1 -n 41 > nul && "C:\Users\Admin\AppData\Roaming\EXE.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 413⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:876
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 413⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1956
-
-
C:\Users\Admin\AppData\Roaming\EXE.exe"C:\Users\Admin\AppData\Roaming\EXE.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:1416
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5180ad8fe3294d5cbf1508f3576c70f1c
SHA1831c8ef7b3efedae003526a87139e806c713ed24
SHA25613ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e
SHA512d5a7ece40082978640d886b33729255c4b47a3bac6fac1973eb475599bf3c79795b2314dd4ae6c87685c56a0c9f9990a42a61d0ba9482be81489fae48900933c