Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:40
Static task
static1
Behavioral task
behavioral1
Sample
550cf206978c8dc1e12b4d2a17b61530N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
550cf206978c8dc1e12b4d2a17b61530N.exe
Resource
win10v2004-20240802-en
General
-
Target
550cf206978c8dc1e12b4d2a17b61530N.exe
-
Size
395KB
-
MD5
550cf206978c8dc1e12b4d2a17b61530
-
SHA1
2f25b8ab56a244cc81731f9fd078103841492bc7
-
SHA256
61d9c0dc0a13aced9c78151daee797a05d5c6a88fa4a285bf0d6d8c11e602d2f
-
SHA512
8a9d8322264acf983b1af8450b928e1136d4b37d24dc79d721c0249c31dd178985f89f7ef931de5cdd9233998ca2aee90ff800fb36ec383a8f71a5d66ec3f1d4
-
SSDEEP
6144:4jlYKRF/LReWAsUyEIsYUEH7Ei+1g7eXHIuis9nXLzydK0S0Yqzrx:4jauDReWyg+1G+AslXLzLg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3040 prvos.exe -
Loads dropped DLL 2 IoCs
pid Process 2904 550cf206978c8dc1e12b4d2a17b61530N.exe 2904 550cf206978c8dc1e12b4d2a17b61530N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\prvos.exe" prvos.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 550cf206978c8dc1e12b4d2a17b61530N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prvos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 3040 2904 550cf206978c8dc1e12b4d2a17b61530N.exe 30 PID 2904 wrote to memory of 3040 2904 550cf206978c8dc1e12b4d2a17b61530N.exe 30 PID 2904 wrote to memory of 3040 2904 550cf206978c8dc1e12b4d2a17b61530N.exe 30 PID 2904 wrote to memory of 3040 2904 550cf206978c8dc1e12b4d2a17b61530N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\550cf206978c8dc1e12b4d2a17b61530N.exe"C:\Users\Admin\AppData\Local\Temp\550cf206978c8dc1e12b4d2a17b61530N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\ProgramData\prvos.exe"C:\ProgramData\prvos.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5a24754b4e2dbd1a817e84c51679dae30
SHA18d961e10c25603e93f4093837927ad037022c1e2
SHA256e4ed318d85a489d8872ef8c410072416727871166c3f98acb6c837d278ef08ea
SHA5127d99f27f00cc49e420c668fb209fe34b57dd64abb047d39509385c11fadb42ec338c90d11ba20ece8ec6268ec60bd7287c2bdeadffa94d0e862171d7690b9458
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
258KB
MD5ce29858367204be08c220b00aeab5fa2
SHA12fb8de7e3060c497ccabb8823a18663c5367732b
SHA2565fd08e00abec439859a04a0c93f4354e28fd06b152a86e14711b3715eed0bb08
SHA5121aa11e997179b0e624383290ecc558177714bb5caf41db4c363138df72f591ccbfed71cf69690da3ea6be2c200d88ff53e44b945fdf5e52bb0cf5aa6e1b9d8f4