Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe
Resource
win10v2004-20240802-en
General
-
Target
24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe
-
Size
7.9MB
-
MD5
ad7adb96ab278f79c209927b5903b826
-
SHA1
444298e80eabd5e5c3e839ad9cb77be02b32d4de
-
SHA256
24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db
-
SHA512
c99765ecaea9b59b1c1bc6db96a70107b39e51818078766d6128a8ca6e978543fdb44b82397692e5053253a9779f5ec73e6ad36d88990b2d76664a4aca6aa9d2
-
SSDEEP
196608:81azg7DSm1azg7DSm1azg7DSm1azg7DSN:hg7ufg7ufg7ufg7uN
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2784 7D57AD13E21.exe 2972 Scegli_nome_allegato.exe 832 7D57AD13E21.exe -
Loads dropped DLL 3 IoCs
pid Process 1636 24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe 1636 24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe 1636 24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2784 set thread context of 832 2784 7D57AD13E21.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7D57AD13E21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scegli_nome_allegato.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7D57AD13E21.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1032 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2972 Scegli_nome_allegato.exe 2972 Scegli_nome_allegato.exe 2972 Scegli_nome_allegato.exe 832 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1032 1636 24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe 31 PID 1636 wrote to memory of 1032 1636 24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe 31 PID 1636 wrote to memory of 1032 1636 24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe 31 PID 1636 wrote to memory of 1032 1636 24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe 31 PID 1636 wrote to memory of 2784 1636 24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe 33 PID 1636 wrote to memory of 2784 1636 24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe 33 PID 1636 wrote to memory of 2784 1636 24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe 33 PID 1636 wrote to memory of 2784 1636 24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe 33 PID 1636 wrote to memory of 2972 1636 24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe 34 PID 1636 wrote to memory of 2972 1636 24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe 34 PID 1636 wrote to memory of 2972 1636 24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe 34 PID 1636 wrote to memory of 2972 1636 24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe 34 PID 2784 wrote to memory of 832 2784 7D57AD13E21.exe 35 PID 2784 wrote to memory of 832 2784 7D57AD13E21.exe 35 PID 2784 wrote to memory of 832 2784 7D57AD13E21.exe 35 PID 2784 wrote to memory of 832 2784 7D57AD13E21.exe 35 PID 2784 wrote to memory of 832 2784 7D57AD13E21.exe 35 PID 2784 wrote to memory of 832 2784 7D57AD13E21.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe"C:\Users\Admin\AppData\Local\Temp\24479a004324e40d1967fb90867821dc60e2e7c7d6f34742fa56f1a631f8a8db.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1032
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:832
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad
-
Filesize
7.9MB
MD584fe1d54ae3b7ec610868f533c6f3eb2
SHA149ae47df8fb3282f1aae780b5fb78e1e4cc77c8e
SHA256d2cc9da3c6931e967c16f8e711e10b9c4a5a5eb99f9897a90667c3e9ba387955
SHA512122c8c1dccb961ac4917bba38aaf891530a9132b1775819af17854571523559abdf26deaa96685de6fa2be35d59a02c682fba14015063a0916b751008250c583