Analysis
-
max time kernel
119s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 10:48
Static task
static1
Behavioral task
behavioral1
Sample
3cfdb9937049f4da1c62e9ece7539840N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3cfdb9937049f4da1c62e9ece7539840N.exe
Resource
win10v2004-20240802-en
General
-
Target
3cfdb9937049f4da1c62e9ece7539840N.exe
-
Size
1.7MB
-
MD5
3cfdb9937049f4da1c62e9ece7539840
-
SHA1
c31bd50debf42bbf6de495809ba3884433fea468
-
SHA256
76fc4e71f3ad7a8b5bce65c15ec0a6cfa21ee7a23ad8d73a2a9505b638b6dc22
-
SHA512
4b7ef6bb421871176d7e25e38df515ffe19f629d67dc7e8768d374ba7420ce05355facd29b1e46ca9a45076ca1ddc5c8866d162d97c4b0b58d625ffd9aa20183
-
SSDEEP
24576:i+SFQyRru2P6TW+/OMiFhTCRQwG6F5/xsSSBl76xPbdHURIcNTKarBI:8ZubTWLb33s/xkl76FZUKaKarB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4832 3cfdb993049f4da1c62e9ece7539840N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\WvCebBJ\3cfdb993049f4da1c62e9ece7539840N.exe 3cfdb9937049f4da1c62e9ece7539840N.exe File opened for modification C:\Windows\SysWOW64\WvCebBJ\3cfdb993049f4da1c62e9ece7539840N.exe 3cfdb9937049f4da1c62e9ece7539840N.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\BmorlUQA.dll 3cfdb9937049f4da1c62e9ece7539840N.exe File created C:\Windows\TSilpe.dll 3cfdb993049f4da1c62e9ece7539840N.exe File created C:\Windows\BELdfonQ\DWjHXwI.dll 3cfdb993049f4da1c62e9ece7539840N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cfdb9937049f4da1c62e9ece7539840N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cfdb993049f4da1c62e9ece7539840N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4832 3cfdb993049f4da1c62e9ece7539840N.exe 4832 3cfdb993049f4da1c62e9ece7539840N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2672 wrote to memory of 4832 2672 3cfdb9937049f4da1c62e9ece7539840N.exe 84 PID 2672 wrote to memory of 4832 2672 3cfdb9937049f4da1c62e9ece7539840N.exe 84 PID 2672 wrote to memory of 4832 2672 3cfdb9937049f4da1c62e9ece7539840N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cfdb9937049f4da1c62e9ece7539840N.exe"C:\Users\Admin\AppData\Local\Temp\3cfdb9937049f4da1c62e9ece7539840N.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\WvCebBJ\3cfdb993049f4da1c62e9ece7539840N.exe"C:\Windows\SysWOW64\WvCebBJ\3cfdb993049f4da1c62e9ece7539840N.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD570426af1f7dc4f431cdccfacb5a4101a
SHA1119b73a331509ba1c90d8576cafcf490f792ada2
SHA256f2293f7ba52e3b457e24ea4dec7c7f1d814f64533c16318dce79ebc125ae802d
SHA512f0fe4709b24f1c27f52c466c9cf1dd7231cfb1a77808611d7c2845c1051ae0b8670f5815718dff341a6dd059951b66f2a0f5d933c6abab78fce64c88b94e8958