Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 09:09
Behavioral task
behavioral1
Sample
791e4eed86e4d17301d1f0ba8e75c82d44c4ab2be4b9b9e0c88ad7754948ed82.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
791e4eed86e4d17301d1f0ba8e75c82d44c4ab2be4b9b9e0c88ad7754948ed82.exe
Resource
win10v2004-20240802-en
General
-
Target
791e4eed86e4d17301d1f0ba8e75c82d44c4ab2be4b9b9e0c88ad7754948ed82.exe
-
Size
489KB
-
MD5
e84f530356c6f15110882db972c4d49c
-
SHA1
7c2cefefdd210c907d797a9f73a774086d0d414c
-
SHA256
791e4eed86e4d17301d1f0ba8e75c82d44c4ab2be4b9b9e0c88ad7754948ed82
-
SHA512
84ae1bfddb03dfa0cdbebc51f7f3eb125fd50e6f4d806563eda9ead9284fa9b5c224b36202fe9adb26511842bda5b71dd951e13781ffcd96caccaa823ef68c5f
-
SSDEEP
6144:LTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZrAXTcrLPT4I:LTlrYw1RUh3NFn+N5WfIQIjbs/Zr9T4I
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2920 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 791e4eed86e4d17301d1f0ba8e75c82d44c4ab2be4b9b9e0c88ad7754948ed82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2920 2644 791e4eed86e4d17301d1f0ba8e75c82d44c4ab2be4b9b9e0c88ad7754948ed82.exe 30 PID 2644 wrote to memory of 2920 2644 791e4eed86e4d17301d1f0ba8e75c82d44c4ab2be4b9b9e0c88ad7754948ed82.exe 30 PID 2644 wrote to memory of 2920 2644 791e4eed86e4d17301d1f0ba8e75c82d44c4ab2be4b9b9e0c88ad7754948ed82.exe 30 PID 2644 wrote to memory of 2920 2644 791e4eed86e4d17301d1f0ba8e75c82d44c4ab2be4b9b9e0c88ad7754948ed82.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\791e4eed86e4d17301d1f0ba8e75c82d44c4ab2be4b9b9e0c88ad7754948ed82.exe"C:\Users\Admin\AppData\Local\Temp\791e4eed86e4d17301d1f0ba8e75c82d44c4ab2be4b9b9e0c88ad7754948ed82.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\hfndrsnstpacy.vbs"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
728B
MD5ecf4705734ba218c7e95e805f8b8c580
SHA121ac6a0e04814688deb5f12c68a9540e47a8652e
SHA256ace6381cce6bfb1d57054f707cba23c8705bcfdeb628304f52deb4916e68c3a5
SHA512acc55569ccab9dcf9063c4d5bd9c4b7a585cff8bd397d4954e675045be659c3d956ada2fc50ba5f3d0f1756342cc309ddd398dbe942c975efe3b7bf56a6e36f8