Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 10:57
Behavioral task
behavioral1
Sample
e68080a8c07c4208564f25bfb993cc20N.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
e68080a8c07c4208564f25bfb993cc20N.exe
-
Size
160KB
-
MD5
e68080a8c07c4208564f25bfb993cc20
-
SHA1
d4da661a6154213deb413654f7b24ee78314cb21
-
SHA256
b1c2c0cbfb0d08c60e070067145d8da49db21cce22d186cf92c6f0607587a125
-
SHA512
13cfb37eaef30f83b36cd6195319ab423a0da0a0d3340aef31cd551a20f82f365597c1658457f62d3c40c49a3b8457da162fa91ad4f889c6fc146f61007880e9
-
SSDEEP
1536:IEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:LY+4MiIkLZJNAQ9J6v
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2224-0-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\7CC2218C = "C:\\Users\\Admin\\AppData\\Roaming\\7CC2218C\\bin.exe" winver.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e68080a8c07c4208564f25bfb993cc20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2660 2224 e68080a8c07c4208564f25bfb993cc20N.exe 31 PID 2224 wrote to memory of 2660 2224 e68080a8c07c4208564f25bfb993cc20N.exe 31 PID 2224 wrote to memory of 2660 2224 e68080a8c07c4208564f25bfb993cc20N.exe 31 PID 2224 wrote to memory of 2660 2224 e68080a8c07c4208564f25bfb993cc20N.exe 31 PID 2224 wrote to memory of 2660 2224 e68080a8c07c4208564f25bfb993cc20N.exe 31 PID 2660 wrote to memory of 1200 2660 winver.exe 21 PID 2660 wrote to memory of 1108 2660 winver.exe 19 PID 2660 wrote to memory of 1168 2660 winver.exe 20 PID 2660 wrote to memory of 1200 2660 winver.exe 21 PID 2660 wrote to memory of 1864 2660 winver.exe 25
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\e68080a8c07c4208564f25bfb993cc20N.exe"C:\Users\Admin\AppData\Local\Temp\e68080a8c07c4208564f25bfb993cc20N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2660
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1864