Analysis
-
max time kernel
92s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 08:04
Behavioral task
behavioral1
Sample
f86c6fb6544013453837e5c67e9fd200N.exe
Resource
win7-20240903-en
General
-
Target
f86c6fb6544013453837e5c67e9fd200N.exe
-
Size
38KB
-
MD5
f86c6fb6544013453837e5c67e9fd200
-
SHA1
2773a30b066c54aec527f44526f21221eaf75493
-
SHA256
00249ae9211637ed2ee7b77be77766a5b0fd994ef65ba4a8a7bf223bcfcb92dc
-
SHA512
57a50874e73817b4564dadc510f5685f09d85f3b66efa6d25f4de5f02531eb7bdc6111f2e560a6eac7907745908a1810a88c8a3f3b37713ac1f9af99ab4b784a
-
SSDEEP
768:Nzj1JegVa3Gry+uELEmITCs/NUZ6nZdYbCLECkrQoP9fmF2f1cObB:NWQa2TLEmITcoQxfllfmS1cOF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1532 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 1916 f86c6fb6544013453837e5c67e9fd200N.exe 1916 f86c6fb6544013453837e5c67e9fd200N.exe -
resource yara_rule behavioral1/memory/1916-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/files/0x00080000000161f6-4.dat upx behavioral1/memory/1532-13-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1916-21-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1532-20-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe f86c6fb6544013453837e5c67e9fd200N.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2188 sc.exe 1040 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f86c6fb6544013453837e5c67e9fd200N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1916 f86c6fb6544013453837e5c67e9fd200N.exe 1532 smss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2188 1916 f86c6fb6544013453837e5c67e9fd200N.exe 31 PID 1916 wrote to memory of 2188 1916 f86c6fb6544013453837e5c67e9fd200N.exe 31 PID 1916 wrote to memory of 2188 1916 f86c6fb6544013453837e5c67e9fd200N.exe 31 PID 1916 wrote to memory of 2188 1916 f86c6fb6544013453837e5c67e9fd200N.exe 31 PID 1916 wrote to memory of 1532 1916 f86c6fb6544013453837e5c67e9fd200N.exe 33 PID 1916 wrote to memory of 1532 1916 f86c6fb6544013453837e5c67e9fd200N.exe 33 PID 1916 wrote to memory of 1532 1916 f86c6fb6544013453837e5c67e9fd200N.exe 33 PID 1916 wrote to memory of 1532 1916 f86c6fb6544013453837e5c67e9fd200N.exe 33 PID 1532 wrote to memory of 1040 1532 smss.exe 34 PID 1532 wrote to memory of 1040 1532 smss.exe 34 PID 1532 wrote to memory of 1040 1532 smss.exe 34 PID 1532 wrote to memory of 1040 1532 smss.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f86c6fb6544013453837e5c67e9fd200N.exe"C:\Users\Admin\AppData\Local\Temp\f86c6fb6544013453837e5c67e9fd200N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2188
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD502f3b42d8325b861c6200e055bdae9af
SHA11d787411a6b853652a5f86a18ca68b79a0b811f4
SHA25679a0b16096846e2ee3adfef1d98279f1368da8203591bb52f9ba91b2da6963be
SHA51244385edd37cb927f7592864cbed523c246cd15540ea1fae11cb23757112a068fefcf1fe3aa9c651b921039a5790124c5f492332bfe13c64b9ae5e54955577f9b