Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 13:45
Static task
static1
Behavioral task
behavioral1
Sample
8ddb66026f2896a1975822687f8d56e0N.exe
Resource
win7-20240903-en
General
-
Target
8ddb66026f2896a1975822687f8d56e0N.exe
-
Size
671KB
-
MD5
8ddb66026f2896a1975822687f8d56e0
-
SHA1
3a2f87e084ca38eacf14decc074b6933acaa3d3c
-
SHA256
e7296a2c5ea89b27496c99a71773c9b984416d80133535bd6a0da88d966bc693
-
SHA512
7ac59cbe08d5447ff357e2f8951bccc4eb80e36fef79fd73dbe36f1751e1a05c33f056b1ae876b6604ad14c21e41722f1ccaf3dd2e021408738c9f3beeeebfab
-
SSDEEP
12288:+yMJfsGV33x7oeAxt16F4qTJVmQtRm8ylvtXVwWbGuGRklvilvoDLL/sMAyRdJA:+yMJfsQn1I1Y4qTJVVZullcl6lvGg3k3
Malware Config
Signatures
-
Downloads MZ/PE file
-
resource yara_rule behavioral1/memory/2500-1-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-4-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-5-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-103-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-104-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-106-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-105-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-107-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-155-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-156-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-169-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-178-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-176-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-177-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-180-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-181-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-182-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-184-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-185-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-186-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-187-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-188-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-189-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-191-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-193-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-194-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx behavioral1/memory/2500-197-0x0000000001DC0000-0x0000000001F07000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ddb66026f2896a1975822687f8d56e0N.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main 8ddb66026f2896a1975822687f8d56e0N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2500 8ddb66026f2896a1975822687f8d56e0N.exe 2500 8ddb66026f2896a1975822687f8d56e0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2500 8ddb66026f2896a1975822687f8d56e0N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2500 8ddb66026f2896a1975822687f8d56e0N.exe 2500 8ddb66026f2896a1975822687f8d56e0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ddb66026f2896a1975822687f8d56e0N.exe"C:\Users\Admin\AppData\Local\Temp\8ddb66026f2896a1975822687f8d56e0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
8KB
MD524731a34476d7fd73573f5feae975fbe
SHA1493e83f48d8e2e09cba49b7eaaf0ab2067c576a7
SHA256a9b2e7fd02919d032e06de4a1a5b4652356dc5ccaf4493d222607bfe6ba2d4dd
SHA51251de71de72d426a28f0f578efc151252695a887975ae58a62735c0a5b97ad7ddc7b8854bb59f604084b07887466f8d154303fdc392a9cabc69986ce3079b6f6c
-
Filesize
506B
MD55335f1c12201b5f7cf5f8b4f5692e3d1
SHA113807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA5120d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df
-
Filesize
18KB
MD512bd9d046c74d0b86d70a9c67fd9be8f
SHA150eccbf4759b394de2cb5ec821b571b59761f852
SHA256479057f211e737ff382f914286892dbab536a2599130778074e88963c598ff50
SHA5128ce5e60c021122e96904902bb14db310e78a80938baf83219d34b9c9e69f29a11d0146f3cd2c3a6d97730de388726e6b224c1d08d0d01ebc48aba0d7644bed6b
-
Filesize
207B
MD5c222a4f3d309721c0898606960120266
SHA1cdee967961a3ea87565ae7ca287be8ed20496160
SHA256f638cc042b7ade6f43f2faf0077e020137562e559178396b7e975db39ac13df6
SHA512db52224964ffd03fa65fddabea29d4f7c23840a18d1ad1028f228589c8c642280a762d2f4250159106f911455b8f0706a3b204dcbbb0484638d4f41f4f54a836
-
Filesize
207B
MD5f5bdb3cabdc15580d97fa94aa3397c08
SHA1d73b3bc67c9fe124768697cee7eec84c2b1eee4f
SHA256b28db98f2a6b06b6783b8fca6aabdcb89234d5bd4306fa71711988dba1fc71ea
SHA512511de8d97853457a37f89550f4b283ed69c05efdb7ce63657bc53b4e37ddf357577738be92da4bcd736d9c3c181c5ffc50b890c8cd5aa27099a87acf2c600fad
-
Filesize
863B
MD5aebc9f7755027a8790663b5d74088c42
SHA1d567455a3e106cd5f456b1b0f395a0d0336aaa27
SHA256b3f34c560de55adc8c9eadef4a7779f2d2e6ee0997c340d8f10a8dda63c86696
SHA51253d4ce45e5c943c11d7951bc9f6563d3365ce36786ddc952bf6b3469b46a2c326410da29aff1061b21800b1cfff3088e3f3dfcad9f34a0962d069dd3a6fea3ee
-
Filesize
846B
MD5f6a0a0c082bc7ddc1e0e599493949e1f
SHA173b63bb6233e0e27b58ccdcb4ac32b05e36ce046
SHA256b01fb9069f905b1f8ec3b72937e1a7a415fa62ee289aa79c68f65eee43bdd762
SHA512ed5176bb258835a6346322a0ec0564557da28484a7bcc014ad1fcc337b14518b98e37475e41e6ae29cb724333e1c8471dd0f48bcf2a0d4cff522fb15e097716b
-
Filesize
1KB
MD5aa1424f218bf3befbcca3c4c0e42a365
SHA1c91d5dce4ebd543d905026577f8a05dff1d8357e
SHA256e1a823582add59d1406fd36d3f7f86f98873e3201168e542cb49239d6c525ab0
SHA5128ef2ea9613ff50bf028c9ef4611326d61b1cd07d01b89631faa2053449fab9a746e06e59a176dd5cda4f02f77fca8eedbb6e46ae4a78afa416ae8adb7ef0d93b
-
Filesize
1KB
MD561b27f16ef13d3ad95833dd3a932f307
SHA19e0866a07c8309b8f5fb3fbec98531f2ebfbce6f
SHA256be3dee9b5d9f2893607ff916b3c3313987a16092230650dbaeec6e9e36c63ad2
SHA512c3d6a15a826c990bd77c4d2581fe8791fb71346477ee360af50f96a7521e83f5ae89c520af221a737787684eb2b6a714afe9e6d770d9103de4fcc18f767283a0
-
Filesize
10KB
MD557ca1a2085d82f0574e3ef740b9a5ead
SHA12974f4bf37231205a256f2648189a461e74869c0
SHA256476a7b1085cc64de1c0eb74a6776fa8385d57eb18774f199df83fc4d7bbcc24e
SHA5122d50b9095d06ffd15eeeccf0eb438026ca8d09ba57141fed87a60edd2384e2139320fb5539144a2f16de885c49b0919a93690974f32b73654debca01d9d7d55c
-
Filesize
493B
MD5818b8908ace0ccc5fecbca20f2919587
SHA1e599b4229d622c36bc6cd5b155c94c50d1a68b86
SHA256ad2ec992fc336af09f7be4a652d240936a08bf522d10ff7fbec5dbfe0c4d332d
SHA5127d63287a12f519524146f7ed620aee6724489fa351752e7eb64e99fae098e524e744e570d2b7abc21f89064cff2bdaa9864f7f0cda9fb9ca861d1df9a45bcd9f
-
Filesize
104B
MD535a600a752d3074501de31a516860499
SHA151eac62cf77a0b88a3e9cb9ee6f85def21fd4bcf
SHA25614e064857751b23da7bbe40861ef4caf99b2496227507b8e3108fbac6d901f75
SHA512046ec179571d239bfb2d51be9837f96d9afebf2e5db77bba0f4a25ce8716d37581a3f9753bd2dbb04c47711699a9d93987bceb71df0b8becf8c577d660320069
-
Filesize
812B
MD5eabb61abba55f80af418fa1128d1548d
SHA1a5ee1d55de2cc60966039120c830fc19cefb0351
SHA256717f3f02f5d5fd1478b6d2ec44acef6e70bb8f1adcf2dc030c08b92e851737e1
SHA512d232072c9540bf0e2fd56f353c2cc83518eabf8282cc02d9f8bec81c0341287ada29ba79f2a515d68722658686b6cce97be138a48f44409562d9a567af200bd6
-
Filesize
221B
MD507cd59b954e8495ad6cd6a7c11d2de86
SHA1787aeda3eee8053705fb208a6b399b8340820b82
SHA2566e6b964fd79b4a3461f128e2ed145b9b641d108b8616695f36387661cae995bb
SHA5120159aca0c2a49393fd91acd4b6819217e67f8fd01e220297eb3e0fdd8132fad794fc317f5cc5e2b761d4123da71478b97df776908de6740eb6d54187c6c00754
-
Filesize
681B
MD55f8dcbf4ebc42ad95cfc4d9401283972
SHA1e4060ea37daa2953bfdf8a773e447143f6365e75
SHA256931193720d26f0007ad223fca1a440f4866047a0ca96f5d29de3e62e7ba6a731
SHA512f918c4b834dff01c82f4b0063708d9155aef87b40fa3ae101d5d0a761ed17a348ff6ba4fb5f1e6ba4921698dcbb3e8291a25e48d180092107cb05660d948a61d
-
Filesize
19KB
MD570e70599d4b853df0f12f6cb0e04695f
SHA16e3a721aef65625bf99b639800476150d262dd4b
SHA25687af4027e8f89459463bdd73df7b928b883eefb20514159d3a1a4be0d39e00c0
SHA5121efcf8af09cf857b3850cec43a88fc8c0992e3b04f78ad2c71b84c2ac7775e745df211582694588b29217aefb1ae02b29b94c2cfe52b5d32bdafb9dce73b9920
-
Filesize
27KB
MD51cc2677e3e29e45e538985839cff2b42
SHA12dab653eb20be72b034a38dc1fcebbd18f079c86
SHA2569216d98a6574dfadacdc8321dc435454cb72c589b3ee8326a9b946966f756d7f
SHA51225575fea9abb1491b5a5853244a9b655ce05f64d98f4b79134674f2d9a560a5af405c1783c9da4a07cfb38b51d060c7a70890c70df6c1c8f4b01e041aa4f649f
-
Filesize
2KB
MD5e3758d529f93fee4807f5ea95fbc1a6c
SHA13a9a1ba234e613e5f808c3ffeda05a10a5dafe00
SHA2568d46eb0c60043dcb7d79ab3d0525148fc901764620c02e4b9c5dd8b0e9026303
SHA512e891552bee3aa10247cad1fcc510331077016a6e71d46827be2dd46017f943c5acc2c1506b41217880d35d52a94989923ad0a345f8791da4bb379eceefe3c407
-
Filesize
6KB
MD5d1171c7772fedd07bcc99258e5235a92
SHA101df464db615df61cbace564e7cb8d563eb372ca
SHA2565d9b860bd42b2d22415fa7f84a204da1981030169956c4d58f7c1d4401826d4a
SHA512eef60c2da1d8abdc0e57bbe5247bf4132a805b826960e879ba05ca57747dbacca98ae2df56674d9227dc8892d2055dc8690a932ee614ae154e8b263fa3cf0bef
-
Filesize
4KB
MD5e6923c9bfbe03193b9c8ceecb32d9cec
SHA182046c3b6cbe37fd29a43a642a9754bb4bc63127
SHA2569beea8d6ec3ad1171785d4f9465ccbc9daf15dccce93b0a4d1049c8438bbfb77
SHA512c611e44ceb2df82a891b2098ec3562a9a030c4cbc537e505991a10be057032cf28d063555cc336b761c7a8f72a17238e891af7bfd74901528db93dedaddb5bbb