Analysis
-
max time kernel
110s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 02:25
Static task
static1
Behavioral task
behavioral1
Sample
cf2b5f465139cc503a51150762c1bc40N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf2b5f465139cc503a51150762c1bc40N.exe
Resource
win10v2004-20240802-en
General
-
Target
cf2b5f465139cc503a51150762c1bc40N.exe
-
Size
669KB
-
MD5
cf2b5f465139cc503a51150762c1bc40
-
SHA1
ae3df4e854bf4ade73c9b0a50b9bb7dbf5d7b990
-
SHA256
39499dd9ec7c300258547bc27886b92014c0f6ad10147be8437247180c14e708
-
SHA512
b34d4a4f9e8f7d35737994fde2a33a5b785b510bc059425f3a8295cf245ad12c6f2d263a801bdd28bef915f0b71b9823dcc2a2fd65db3a655751ecaa1d8e20cd
-
SSDEEP
12288:XPMBNf1rFe2lN26zXrhvazX+nC/OqAuiLXDSobdjoaxAt8NUtBtQTuMX6ueBsbdf:fMjfm2lDlS7uaOqAvSoaUAQGB2ThX6uV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1940 od_group_vcl.exe -
Loads dropped DLL 6 IoCs
pid Process 2308 cf2b5f465139cc503a51150762c1bc40N.exe 2308 cf2b5f465139cc503a51150762c1bc40N.exe 1940 od_group_vcl.exe 1940 od_group_vcl.exe 1940 od_group_vcl.exe 1940 od_group_vcl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf2b5f465139cc503a51150762c1bc40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language od_group_vcl.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1940 2308 cf2b5f465139cc503a51150762c1bc40N.exe 31 PID 2308 wrote to memory of 1940 2308 cf2b5f465139cc503a51150762c1bc40N.exe 31 PID 2308 wrote to memory of 1940 2308 cf2b5f465139cc503a51150762c1bc40N.exe 31 PID 2308 wrote to memory of 1940 2308 cf2b5f465139cc503a51150762c1bc40N.exe 31 PID 2308 wrote to memory of 1940 2308 cf2b5f465139cc503a51150762c1bc40N.exe 31 PID 2308 wrote to memory of 1940 2308 cf2b5f465139cc503a51150762c1bc40N.exe 31 PID 2308 wrote to memory of 1940 2308 cf2b5f465139cc503a51150762c1bc40N.exe 31 PID 1940 wrote to memory of 2080 1940 od_group_vcl.exe 32 PID 1940 wrote to memory of 2080 1940 od_group_vcl.exe 32 PID 1940 wrote to memory of 2080 1940 od_group_vcl.exe 32 PID 1940 wrote to memory of 2080 1940 od_group_vcl.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf2b5f465139cc503a51150762c1bc40N.exe"C:\Users\Admin\AppData\Local\Temp\cf2b5f465139cc503a51150762c1bc40N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\¹ÜÀíÕ¾\od_group_vcl.exeC:\Users\Admin\AppData\Local\Temp\¹ÜÀíÕ¾\od_group_vcl.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2080
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD5d5280adfa0a621dacfbf659a26d1829a
SHA13e4e8913baf885235cd54a1c67ae17bcf8157a47
SHA256e199ecd0c8bb06e565a0f6de29d73ae49eb3b3de3a2038ca980448ee49bdd5a7
SHA5124868e6534b714e0f92e99b74d24a779c2b0cf3c7f9a7f71f9d93537a08b90190117570c23490ee3defe06bbd838299b762ed55ef0999abe6f83a310e27509899
-
Filesize
264KB
MD545713c1a2f65f41b2f58f9af30a77d9a
SHA1d33479e3acfe3b35ba8a3778f6550ef5bf5177e7
SHA256111d92d44bca796ccf48e0278196d27b52116b10e9ed7434f84aaaddce78ac23
SHA51244665dc6e9e8a9361895a9eac2b6dc7000284fbadea51f5368eaa94b622526c217162da55520798f2a7e2b3eecd444d531d76fa9fcd17115ae08d3206282d508
-
Filesize
1.4MB
MD5deb3c1d70ff88e506e46d423ddffe884
SHA17fb5e5442bdf816dd52c608a41e8bbafb77ae456
SHA256f28751bef6992581284654353f30a80c31a18279d6b609acabb981e6824a69b0
SHA512036c429d066c3b2cac6214bdb1f4e391c7e203c688414d931df74238f9cb4703c8c20c2424bf773d61a18f515a63cfe5d13bb3080a47350855e265a01bf58cb7