Analysis
-
max time kernel
119s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 23:04
Static task
static1
Behavioral task
behavioral1
Sample
e4b35a4db8ac1d6237a5d8e43940c670N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4b35a4db8ac1d6237a5d8e43940c670N.exe
Resource
win10v2004-20240802-en
General
-
Target
e4b35a4db8ac1d6237a5d8e43940c670N.exe
-
Size
463KB
-
MD5
e4b35a4db8ac1d6237a5d8e43940c670
-
SHA1
a3f96d0bd462f173d1a66c18b356a4dff026bb2c
-
SHA256
7a0fd5b18243f89e7593ce6586543abfad775939120e368994342e982d2eb4fe
-
SHA512
bbc53863082ae1bbc21fc9c8c7dccc544b8052240b35ad6011ac8234edad76e0fd12475e80a59a726b6c406c20d0e06c83b45a3ac7e2973c81c7089cd6f1f33f
-
SSDEEP
6144:6SkWcDpi78KSrafqV5areuyFwBqgmGNGXN/O8OCLGzVUPtud7WHDUJVpCMZCWfGH:6Slc87eqqV5e+wBV6O+Kz8ty7hZLLfG
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2496 ktmuPING.exe 2832 ~7E44.tmp 2636 grpcsort.exe -
Loads dropped DLL 3 IoCs
pid Process 1992 e4b35a4db8ac1d6237a5d8e43940c670N.exe 1992 e4b35a4db8ac1d6237a5d8e43940c670N.exe 2496 ktmuPING.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\MuiUup16 = "C:\\Users\\Admin\\AppData\\Roaming\\ndadlwiz\\ktmuPING.exe" e4b35a4db8ac1d6237a5d8e43940c670N.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\grpcsort.exe e4b35a4db8ac1d6237a5d8e43940c670N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4b35a4db8ac1d6237a5d8e43940c670N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ktmuPING.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grpcsort.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2496 ktmuPING.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2496 ktmuPING.exe 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2496 ktmuPING.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2496 1992 e4b35a4db8ac1d6237a5d8e43940c670N.exe 30 PID 1992 wrote to memory of 2496 1992 e4b35a4db8ac1d6237a5d8e43940c670N.exe 30 PID 1992 wrote to memory of 2496 1992 e4b35a4db8ac1d6237a5d8e43940c670N.exe 30 PID 1992 wrote to memory of 2496 1992 e4b35a4db8ac1d6237a5d8e43940c670N.exe 30 PID 2496 wrote to memory of 2832 2496 ktmuPING.exe 31 PID 2496 wrote to memory of 2832 2496 ktmuPING.exe 31 PID 2496 wrote to memory of 2832 2496 ktmuPING.exe 31 PID 2496 wrote to memory of 2832 2496 ktmuPING.exe 31 PID 2832 wrote to memory of 1232 2832 ~7E44.tmp 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\e4b35a4db8ac1d6237a5d8e43940c670N.exe"C:\Users\Admin\AppData\Local\Temp\e4b35a4db8ac1d6237a5d8e43940c670N.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Roaming\ndadlwiz\ktmuPING.exe"C:\Users\Admin\AppData\Roaming\ndadlwiz"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\~7E44.tmp1232 474632 2496 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832
-
-
-
-
C:\Windows\SysWOW64\grpcsort.exeC:\Windows\SysWOW64\grpcsort.exe -s1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD586dc243576cf5c7445451af37631eea9
SHA199a81c47c4c02f32c0ab456bfa23c306c7a09bf9
SHA25625d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a
SHA512c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4
-
Filesize
463KB
MD5e720027b096aedca635f6a2c49b2e78d
SHA11c40ed463dd91a811dfb2aacfe26be4e45b36a6f
SHA25674a7df3b431233d42e0613479f7f1f50bd1d516377f8acef21903cb48d4cec02
SHA51279f8e1f413581e32965f160c47d8f396b08e311d6925267c5d0f5ef78bd5d6c19a4a9d8d275179da05e18abfe301d5c105ffd00f288e5d342378874c21db3887