Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 17:31
Behavioral task
behavioral1
Sample
7608c5ad7401ed4b83ea421bb2075780N.exe
Resource
win7-20240903-en
General
-
Target
7608c5ad7401ed4b83ea421bb2075780N.exe
-
Size
38KB
-
MD5
7608c5ad7401ed4b83ea421bb2075780
-
SHA1
a701b2ebadc6b13137185a77ed8861526f510410
-
SHA256
c80e667a05c4f261dd175c01e06e40b68bac91632dde469ea0b00b6adece9a26
-
SHA512
0f40a898007f51f67939947e7a4d73472a20c7bb5fb129b69ca8be8fc8adfbbb28316d8577b75279415a9e93b9c7916ae907f18a4cd16db38ccec9899bb0d76c
-
SSDEEP
768:Nzj1JegVa3Gry+uELEmITCs/NUZ6nZdYbCLECkrQoP9fmF2f1cONEIV:NWQa2TLEmITcoQxfllfmS1cOeIV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4232 smss.exe -
resource yara_rule behavioral2/memory/4832-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/files/0x0007000000023631-5.dat upx behavioral2/memory/4832-11-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4232-13-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe 7608c5ad7401ed4b83ea421bb2075780N.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2684 sc.exe 4244 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7608c5ad7401ed4b83ea421bb2075780N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4832 7608c5ad7401ed4b83ea421bb2075780N.exe 4232 smss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4832 wrote to memory of 2684 4832 7608c5ad7401ed4b83ea421bb2075780N.exe 90 PID 4832 wrote to memory of 2684 4832 7608c5ad7401ed4b83ea421bb2075780N.exe 90 PID 4832 wrote to memory of 2684 4832 7608c5ad7401ed4b83ea421bb2075780N.exe 90 PID 4832 wrote to memory of 4232 4832 7608c5ad7401ed4b83ea421bb2075780N.exe 92 PID 4832 wrote to memory of 4232 4832 7608c5ad7401ed4b83ea421bb2075780N.exe 92 PID 4832 wrote to memory of 4232 4832 7608c5ad7401ed4b83ea421bb2075780N.exe 92 PID 4232 wrote to memory of 4244 4232 smss.exe 93 PID 4232 wrote to memory of 4244 4232 smss.exe 93 PID 4232 wrote to memory of 4244 4232 smss.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\7608c5ad7401ed4b83ea421bb2075780N.exe"C:\Users\Admin\AppData\Local\Temp\7608c5ad7401ed4b83ea421bb2075780N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4244
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3708,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4512 /prefetch:81⤵PID:3036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5f827d045a937dfc1672dac74c94e2a32
SHA1c95ea987653a833da9c70793f11b5f33245522ad
SHA2562cc39806d4c336a4f90c474678de57d06588133e849e8ab345be634249de3581
SHA5127e770dd64af958a495e8789e25636304184e248cf44847bcde35c333db1f43e5fc6fa4457979ab410d3b090258fd5df01e4a76704759e1b0e03c827959f1f2e0