Analysis
-
max time kernel
19s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 15:47
Behavioral task
behavioral1
Sample
cff86170bf5321778f6d23ed50993730N.exe
Resource
win7-20240704-en
9 signatures
120 seconds
General
-
Target
cff86170bf5321778f6d23ed50993730N.exe
-
Size
444KB
-
MD5
cff86170bf5321778f6d23ed50993730
-
SHA1
ea62c47afb52a1ab45f1ef9a60c170d41be06136
-
SHA256
8a53ba66968e15d1c869cf4f6c5a245d18d66a1e8a9648c413d84d456ca75263
-
SHA512
82767420f5f1dc4ed461d4a0857e7df0a8a31401b990b79b2e7f09df6533d1a4411dfc94c2ec4f0bdeb475e2c8b052944c69b26d55e2720463e5cacfb478ec98
-
SSDEEP
6144:AUIRzc4g6H4clh5xb7wjrD+SCC3p3POCHiAVUeVInXDPk74OvhiOQ24zv:Azg6Hh9twjrFCCdLSDMNhr8r
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2416-0-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2416-3-0x0000000000400000-0x0000000000470000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\JP595IR86O = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cff86170bf5321778f6d23ed50993730N.exe" cff86170bf5321778f6d23ed50993730N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job cff86170bf5321778f6d23ed50993730N.exe File created C:\Windows\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job cff86170bf5321778f6d23ed50993730N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cff86170bf5321778f6d23ed50993730N.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main cff86170bf5321778f6d23ed50993730N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2416 cff86170bf5321778f6d23ed50993730N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2416 cff86170bf5321778f6d23ed50993730N.exe 2416 cff86170bf5321778f6d23ed50993730N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2416 cff86170bf5321778f6d23ed50993730N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cff86170bf5321778f6d23ed50993730N.exe"C:\Users\Admin\AppData\Local\Temp\cff86170bf5321778f6d23ed50993730N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:2416