Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-09-2024 02:27
Behavioral task
behavioral1
Sample
DN.exe
Resource
win7-20240903-en
General
-
Target
DN.exe
-
Size
684KB
-
MD5
072a37259f30feae8d01456e3a7b84d2
-
SHA1
d3c9d4fd95370cf6063010844673324d92811cec
-
SHA256
d662f78e5e0c62cdc866836476cc59a0f26edd95d9e14fd2f246792c39f44096
-
SHA512
e1933c1ae0221be707b2421b6b46b4664bcedb5df6eefa76429580ba354bfbfd987d4abfbaf1b0c089fe4c63fbbf8ba17c5462f882ed379d1be5eadd6efedf1e
-
SSDEEP
12288:YYV6MorX7qzuC3QHO9FQVHPF51jgc4nD8PL1ekJwMDaXDA7515EWHYu2OYx/tZN:3BXu9HGaVH4D8TtZDSDA75kWH6j
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2268-0-0x0000000001280000-0x0000000001403000-memory.dmp upx behavioral1/memory/2268-16-0x0000000001280000-0x0000000001403000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2268-16-0x0000000001280000-0x0000000001403000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2268 set thread context of 2116 2268 DN.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DN.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2268 DN.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2268 DN.exe 2268 DN.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2268 DN.exe 2268 DN.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2116 2268 DN.exe 30 PID 2268 wrote to memory of 2116 2268 DN.exe 30 PID 2268 wrote to memory of 2116 2268 DN.exe 30 PID 2268 wrote to memory of 2116 2268 DN.exe 30 PID 2268 wrote to memory of 2116 2268 DN.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\DN.exe"C:\Users\Admin\AppData\Local\Temp\DN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\DN.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5e0a2ebcf9ce03e4c26c1098269006f0f
SHA116f44233d84b023dd8214254a2e65eff384acdb2
SHA256f262742afc9489a88376d8a668e8be4e2861380240f3119c1d6a8f56723056fa
SHA51262f9e78e2c4969607e1b5c4721b78a7f19d936ce76dba141c562bf8680dc211628f3632bcea52683805a333a0207a23618d498ebe798216ce79f23058997b474