Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 12:06
Static task
static1
Behavioral task
behavioral1
Sample
eeb4d8e7f756e6bec0880b02a3298a50N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeb4d8e7f756e6bec0880b02a3298a50N.exe
Resource
win10v2004-20240802-en
General
-
Target
eeb4d8e7f756e6bec0880b02a3298a50N.exe
-
Size
89KB
-
MD5
eeb4d8e7f756e6bec0880b02a3298a50
-
SHA1
dc10e05d5e37405c23719fe7a2129461d60b39b7
-
SHA256
0490bc6655d9b0a0a1925c4e883f47ac5d2041b9596e40827328666c23fd2bd5
-
SHA512
2977601457aee1764ac0e6f2a05b191637b54eed7258c0301be034cc492be252ace3b6bb3afa509a21c682420af28659e209dc964a3908136131ddbbaddf9640
-
SSDEEP
1536:F9o65gQK3Zm+Mt9RV5O8oQ9cXFunGm6ManhFLnBqHan6owwosTk8vxA:F9o6fK2XqXQwhnHlqQo8Lvy
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\6C0304B3 = "C:\\Users\\Admin\\AppData\\Roaming\\6C0304B3\\bin.exe" winver.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeb4d8e7f756e6bec0880b02a3298a50N.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe 2432 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 winver.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2432 1684 eeb4d8e7f756e6bec0880b02a3298a50N.exe 28 PID 1684 wrote to memory of 2432 1684 eeb4d8e7f756e6bec0880b02a3298a50N.exe 28 PID 1684 wrote to memory of 2432 1684 eeb4d8e7f756e6bec0880b02a3298a50N.exe 28 PID 1684 wrote to memory of 2432 1684 eeb4d8e7f756e6bec0880b02a3298a50N.exe 28 PID 1684 wrote to memory of 2432 1684 eeb4d8e7f756e6bec0880b02a3298a50N.exe 28 PID 2432 wrote to memory of 1200 2432 winver.exe 21 PID 2432 wrote to memory of 1120 2432 winver.exe 19 PID 2432 wrote to memory of 1164 2432 winver.exe 20 PID 2432 wrote to memory of 1200 2432 winver.exe 21 PID 2432 wrote to memory of 1624 2432 winver.exe 23 PID 2432 wrote to memory of 1684 2432 winver.exe 27
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\eeb4d8e7f756e6bec0880b02a3298a50N.exe"C:\Users\Admin\AppData\Local\Temp\eeb4d8e7f756e6bec0880b02a3298a50N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2432
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1624