Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:10
Static task
static1
Behavioral task
behavioral1
Sample
4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe
Resource
win10v2004-20240802-en
General
-
Target
4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe
-
Size
1.2MB
-
MD5
562cb5dcba0e691bf01ab2c020c0837e
-
SHA1
3ca5eb915edcce7da20a7b6046055cb11333647e
-
SHA256
4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52
-
SHA512
130e921e7bd869c6367a4fe664a5fe9df6432ff5ca3519d9fe4d378b52f4675b89ec9312a02ea8246868326d9c0c65703a45e289478afc7f26ce1ce6310077a9
-
SSDEEP
24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8awSX4F1d5Y/j20uMjwr4b:oTvC/MTQYxsWR7aw6yYpw4
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3064 set thread context of 2664 3064 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 30 PID 2664 set thread context of 1232 2664 svchost.exe 21 PID 2664 set thread context of 2512 2664 svchost.exe 31 PID 2512 set thread context of 1232 2512 msiexec.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2664 svchost.exe 2664 svchost.exe 2664 svchost.exe 2664 svchost.exe 2664 svchost.exe 2664 svchost.exe 2664 svchost.exe 2664 svchost.exe 2512 msiexec.exe 2512 msiexec.exe 2512 msiexec.exe 2512 msiexec.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3064 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 2664 svchost.exe 1232 Explorer.EXE 1232 Explorer.EXE 2512 msiexec.exe 2512 msiexec.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3064 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 3064 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3064 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 3064 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2664 3064 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 30 PID 3064 wrote to memory of 2664 3064 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 30 PID 3064 wrote to memory of 2664 3064 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 30 PID 3064 wrote to memory of 2664 3064 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 30 PID 3064 wrote to memory of 2664 3064 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 30 PID 1232 wrote to memory of 2512 1232 Explorer.EXE 31 PID 1232 wrote to memory of 2512 1232 Explorer.EXE 31 PID 1232 wrote to memory of 2512 1232 Explorer.EXE 31 PID 1232 wrote to memory of 2512 1232 Explorer.EXE 31 PID 1232 wrote to memory of 2512 1232 Explorer.EXE 31 PID 1232 wrote to memory of 2512 1232 Explorer.EXE 31 PID 1232 wrote to memory of 2512 1232 Explorer.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe"C:\Users\Admin\AppData\Local\Temp\4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2664
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD5a1fb5c2c967aa8558c7d23183f7afd9c
SHA146a77e92eade977bbf0ec71afb2bc2a413e2af3b
SHA256acc62b73f9afc1ffa76dfd1823bb3b6e2257ef8058cf8e7daf733fd584ed9ef2
SHA51204e2a1888d8751774ecaf2d0a55bc92acac79e0212771355d8da9c7d6644a72a574d1686cc065900d04c08edc22b29560fcfac7d2f9b5698544b65b3424b03ec