Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 05:13
Behavioral task
behavioral1
Sample
6b26ac502c0967d0be631d90bcbf48f0N.exe
Resource
win7-20240903-en
General
-
Target
6b26ac502c0967d0be631d90bcbf48f0N.exe
-
Size
55KB
-
MD5
6b26ac502c0967d0be631d90bcbf48f0
-
SHA1
a87282224c816f06ede154427b28c3c94d8beeea
-
SHA256
16316ceece3b24a05e00f5b93d84f12b49c9238fe8dbc6f718c609f6f5d18ed9
-
SHA512
9fe32da8b643ba05e143624e30a4348f37e2d21070dea96be06a5e71f1262dd4a477ef2b9c9a40a01f3c3fa6f87ddfd4819bb2053b8428b893b317652f764367
-
SSDEEP
384:63AhVC2PJ6wRC8vPpMiuMZkVo+TPo7bIEuiI8LbRKvsYJtuigBe68tRbSl4xHjTS:2CLP5uK6DoNupKYsTicUta4xni9L
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2524 zmvmo.exe -
Loads dropped DLL 1 IoCs
pid Process 1644 6b26ac502c0967d0be631d90bcbf48f0N.exe -
resource yara_rule behavioral1/memory/1644-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000c00000001226d-6.dat upx behavioral1/memory/1644-8-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2524-9-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2524-10-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b26ac502c0967d0be631d90bcbf48f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zmvmo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2524 1644 6b26ac502c0967d0be631d90bcbf48f0N.exe 30 PID 1644 wrote to memory of 2524 1644 6b26ac502c0967d0be631d90bcbf48f0N.exe 30 PID 1644 wrote to memory of 2524 1644 6b26ac502c0967d0be631d90bcbf48f0N.exe 30 PID 1644 wrote to memory of 2524 1644 6b26ac502c0967d0be631d90bcbf48f0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b26ac502c0967d0be631d90bcbf48f0N.exe"C:\Users\Admin\AppData\Local\Temp\6b26ac502c0967d0be631d90bcbf48f0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\zmvmo.exe"C:\Users\Admin\AppData\Local\Temp\zmvmo.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5025a6ad722a6cce021295cec4e33403c
SHA1d14ca82ec3a4e3f0384e1bdc31c5078690318862
SHA256e589bd0588784e8de1aab1f81b5b7979733527470cb0e7bb7c7c7411fb534d84
SHA512804a4b8c67b871b80e96639a437ec18d7d96d28d470238784c3fd908a2dfa8f5f46f3a65b6af7add03f004980795a0510b470094eba32390032f20e45aabf4d1