Analysis
-
max time kernel
91s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 04:58
Static task
static1
Behavioral task
behavioral1
Sample
408972002bfb150e704e4e4442e7e4d0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
408972002bfb150e704e4e4442e7e4d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
408972002bfb150e704e4e4442e7e4d0N.exe
-
Size
420KB
-
MD5
408972002bfb150e704e4e4442e7e4d0
-
SHA1
29e016b099d6b8c83113e14c3f4fcf874310d617
-
SHA256
08a9858aea4ab4c61ed1b06110122889d76668f03638818d9eeb68fb39f2d138
-
SHA512
9dfd60fd2f0c3064021b09ca4e5ca14e0be6627e65a0a775e624ce292c28516db2fa927cdf9d194749ba1f395bc44cd67c4a69a664a761f90d07a18004b9289a
-
SSDEEP
12288:e301ufaAbdEM5eJKL7LGdK6GiQDkxvlE:CvEGvDk0
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\s2er333vice9.ini 408972002bfb150e704e4e4442e7e4d0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2188 prototype.exe -
Loads dropped DLL 2 IoCs
pid Process 1916 408972002bfb150e704e4e4442e7e4d0N.exe 1916 408972002bfb150e704e4e4442e7e4d0N.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created \??\c:\program files\Realplayer\conforms\prototype.exe 408972002bfb150e704e4e4442e7e4d0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prototype.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 408972002bfb150e704e4e4442e7e4d0N.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1916 408972002bfb150e704e4e4442e7e4d0N.exe 1916 408972002bfb150e704e4e4442e7e4d0N.exe 1916 408972002bfb150e704e4e4442e7e4d0N.exe 1916 408972002bfb150e704e4e4442e7e4d0N.exe 2188 prototype.exe 2188 prototype.exe 2188 prototype.exe 2188 prototype.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2188 1916 408972002bfb150e704e4e4442e7e4d0N.exe 31 PID 1916 wrote to memory of 2188 1916 408972002bfb150e704e4e4442e7e4d0N.exe 31 PID 1916 wrote to memory of 2188 1916 408972002bfb150e704e4e4442e7e4d0N.exe 31 PID 1916 wrote to memory of 2188 1916 408972002bfb150e704e4e4442e7e4d0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\408972002bfb150e704e4e4442e7e4d0N.exe"C:\Users\Admin\AppData\Local\Temp\408972002bfb150e704e4e4442e7e4d0N.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
\??\c:\program files\Realplayer\conforms\prototype.exe"c:\program files\Realplayer\conforms\prototype.exe" "33201"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
420KB
MD589bcdaa29935f72bcc5c12b5268b3a15
SHA181e369917f3f835c020204bbaf800939abe204a9
SHA25641d0d9ce3c41e2c748e0a54df1e788ffee73ae92c73b18a1e80037d9983611d1
SHA512c34b643760ed5ba5cc2a63f28d99b0be55eae1750e0e7bcd2eedcbaeab02cd84464310d95a9ffbb319c085e1a8be163375acd6d0d72230844917baf3f3dc4ad5