Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:37
Static task
static1
Behavioral task
behavioral1
Sample
79fb46e342e3ad273f60269f02df4d50N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
79fb46e342e3ad273f60269f02df4d50N.exe
Resource
win10v2004-20240802-en
General
-
Target
79fb46e342e3ad273f60269f02df4d50N.exe
-
Size
56KB
-
MD5
79fb46e342e3ad273f60269f02df4d50
-
SHA1
77f7d93b70a30a1582f3eefa8dc01690dcb52155
-
SHA256
b9913cbdd4a239682e7f136eb4bc163d17e874b644bb8296775170718c56b958
-
SHA512
75f1ad89b36d6e731cb92bbe0076ac90fa47e541ba8a8ff90afcf863bc6f2d87be58d6a4011f11ac61c54b2165021647fa7701eaff5b9554b38c3e37ed9751b4
-
SSDEEP
768:D00UHf57LnWykdBdusOAL/2DH9owR97k9/l4ElXYWFoHiPI6zDwRT6cBJhFd/B5+:D00URPnKfZrT2DawRR8JfP3QZB355B/s
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2776 odbc32.exe -
Loads dropped DLL 1 IoCs
pid Process 1420 79fb46e342e3ad273f60269f02df4d50N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Network Services = "\"C:\\Windows\\SysWOW64\\odbc32.exe\" /O0" odbc32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\odbc32.exe 79fb46e342e3ad273f60269f02df4d50N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79fb46e342e3ad273f60269f02df4d50N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2776 1420 79fb46e342e3ad273f60269f02df4d50N.exe 30 PID 1420 wrote to memory of 2776 1420 79fb46e342e3ad273f60269f02df4d50N.exe 30 PID 1420 wrote to memory of 2776 1420 79fb46e342e3ad273f60269f02df4d50N.exe 30 PID 1420 wrote to memory of 2776 1420 79fb46e342e3ad273f60269f02df4d50N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\79fb46e342e3ad273f60269f02df4d50N.exe"C:\Users\Admin\AppData\Local\Temp\79fb46e342e3ad273f60269f02df4d50N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\odbc32.exe"C:\Windows\system32\odbc32.exe" /O02⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5848aa550120abc106d464c6a649ce6a2
SHA1fccb471a74fb3374deff419b5148d99300009dcf
SHA256a0b80496efe608d5b5653b17c2dd49799da03c541afda9a07272ecc401550e46
SHA512c8635ffbaba8048d94d88c2b84e4e7d7c262bf9dcb96fd0a8aada28c6f9e8e9196ce3a2e9bb624769f31cdde4416217d768cebdb9c1a9b7bb8144d5d036f8853