Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe
Resource
win10v2004-20240802-en
General
-
Target
c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe
-
Size
2.0MB
-
MD5
7ff8012615e2c9e555ba49570317e54a
-
SHA1
6be8e18451027f6606de6ebe1b25339b7369bc00
-
SHA256
c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778
-
SHA512
76c6af9017f1b600f122ed583ef619e90934bc987ef0b76a1479f96de37dbd792c0854ade6a62df78285aa97a3e7feb2408ea8e0a24f4996491cd2778cb6998a
-
SSDEEP
49152:ovCg7XJLrduEyztsR7OQzQzAmjqamm173f:oKg7dd/yzt67OU7apv
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1724 7D57AD13E21.exe 2604 Scegli_nome_allegato.exe 2784 7D57AD13E21.exe -
Loads dropped DLL 3 IoCs
pid Process 2928 c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe 2928 c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe 2928 c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1724 set thread context of 2784 1724 7D57AD13E21.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7D57AD13E21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scegli_nome_allegato.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7D57AD13E21.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2840 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2604 Scegli_nome_allegato.exe 2604 Scegli_nome_allegato.exe 2604 Scegli_nome_allegato.exe 2784 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2840 2928 c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe 30 PID 2928 wrote to memory of 2840 2928 c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe 30 PID 2928 wrote to memory of 2840 2928 c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe 30 PID 2928 wrote to memory of 2840 2928 c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe 30 PID 2928 wrote to memory of 1724 2928 c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe 32 PID 2928 wrote to memory of 1724 2928 c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe 32 PID 2928 wrote to memory of 1724 2928 c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe 32 PID 2928 wrote to memory of 1724 2928 c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe 32 PID 2928 wrote to memory of 2604 2928 c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe 33 PID 2928 wrote to memory of 2604 2928 c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe 33 PID 2928 wrote to memory of 2604 2928 c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe 33 PID 2928 wrote to memory of 2604 2928 c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe 33 PID 1724 wrote to memory of 2784 1724 7D57AD13E21.exe 35 PID 1724 wrote to memory of 2784 1724 7D57AD13E21.exe 35 PID 1724 wrote to memory of 2784 1724 7D57AD13E21.exe 35 PID 1724 wrote to memory of 2784 1724 7D57AD13E21.exe 35 PID 1724 wrote to memory of 2784 1724 7D57AD13E21.exe 35 PID 1724 wrote to memory of 2784 1724 7D57AD13E21.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe"C:\Users\Admin\AppData\Local\Temp\c29efa044c3880b1a7731f4617c738b7eae9a7d726e212fc7ac5d2300caa9778.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2840
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2784
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD55b3eb65a75f26403335b5e12375e855e
SHA10671983499b06c1e9d68c0f9b5f140028e4787a7
SHA256ab4734e4b4912a8568a949cb54d684fd15fda2efe70747ec457c50bf3a642ecc
SHA5125c7b42d5836f0ab7f805839f6b7d2b62a05e4d8afdf4f5f3e3a96b94d038e9bd8efb4f27ffbe29f9e0305b866514d5a3ed13086003a4ccd18c24fa8905c9e69b
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad