Analysis
-
max time kernel
101s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
eb5328493f35d7ca2b11eecaaaac0ef0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb5328493f35d7ca2b11eecaaaac0ef0N.exe
Resource
win10v2004-20240802-en
General
-
Target
eb5328493f35d7ca2b11eecaaaac0ef0N.exe
-
Size
481KB
-
MD5
eb5328493f35d7ca2b11eecaaaac0ef0
-
SHA1
cdbee87ab85ef833ee1851f9eeac257b06b43c4e
-
SHA256
d5ce4b3ec815bc4a6f6e99c02200bfc50f100697003209a3d01f28dc8fe278c4
-
SHA512
0b19db89b470208268bd680d639cbd72616fde283e26d59aa87f00ad1f0c9d1c3fcc5f16539442a6a529dfc0dc9362ca869c54e42a611579b8d09bdf5dbc3a38
-
SSDEEP
6144:a2VHOZ1nkHRfDDogCad39teYHQLhR1o/AWeTBK:pOZmHRfDDogCQHQL1cdeTY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4816 svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\OIPjYMbf.dll eb5328493f35d7ca2b11eecaaaac0ef0N.exe File created C:\Windows\rXsAWKYF\svchost.exe eb5328493f35d7ca2b11eecaaaac0ef0N.exe File opened for modification C:\Windows\rXsAWKYF\svchost.exe eb5328493f35d7ca2b11eecaaaac0ef0N.exe File created C:\Windows\CLOG.txt eb5328493f35d7ca2b11eecaaaac0ef0N.exe File created C:\Windows\mUjJqk.dll svchost.exe File opened for modification C:\Windows\CLOG.txt svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb5328493f35d7ca2b11eecaaaac0ef0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4816 svchost.exe 4816 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3412 wrote to memory of 4816 3412 eb5328493f35d7ca2b11eecaaaac0ef0N.exe 84 PID 3412 wrote to memory of 4816 3412 eb5328493f35d7ca2b11eecaaaac0ef0N.exe 84 PID 3412 wrote to memory of 4816 3412 eb5328493f35d7ca2b11eecaaaac0ef0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb5328493f35d7ca2b11eecaaaac0ef0N.exe"C:\Users\Admin\AppData\Local\Temp\eb5328493f35d7ca2b11eecaaaac0ef0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\rXsAWKYF\svchost.exe"C:\Windows\rXsAWKYF\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166B
MD5f10139025b780f2e0c1ac1e4b0b1784e
SHA12872345c36cd9650520967dd3f436b60a72cf52a
SHA256b03de6dc0c3aa6e35f917bac4581f2cdbcd0ffe5e3c7da9ccef1670760958aa5
SHA5121ec022b001e3043f4aafc1141c45b87ec5d16bd9f0751cc023f0781a2ca2bf44517881946c9926fca25194e9458153058f5a896ef088dd686e61d32c19486ecf
-
Filesize
483KB
MD56804341fa7eafe38430a03df3dd013e4
SHA1bbf4a7883d9b138ac2d36a9be188883e4154a9c1
SHA256ed38efd159307beeac66501db970c7fb0b79dec0f3205afb883db14590aeae5c
SHA51247078de2b4eff85190b4aeb76f022bb426afd1f43e990bcc90cf040e6023a824d38b15e9500bf0e620b431ec19e12e1c55c1cfe58db520ae7f11f9c278986879